CVE-2024-3938
CVSS V2 None
CVSS V3 None
Description
The "reset password" login page accepted an HTML injection via URL parameters.
This has already been rectified via patch, and as such it cannot be demonstrated via Demo site link. Those interested to see the vulnerability may spin up a http://localhost:8082/dotAdmin/#/public/login?resetEmailSent=true&resetEmail=%3Ch1%3E%3Ca%20href%3D%22https:%2F%2Fgoogle.com%22%3ECLICK%20ME%3C%2Fa%3E%3C%2Fh1%3E
This will result in a view along these lines:
* OWASP Top 10 - A03: Injection
* CVSS Score: 5.4
* AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator
* https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N&... https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator
Overview
- CVE ID
- CVE-2024-3938
- Assigner
- dotCMS
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-07-25T21:17:49.359Z
- Last Modified Date
- 2024-07-25T21:17:49.359Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://auth.dotcms.com/security/SI-71 |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-3938 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3938 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-07-26 13:02:17 | Added to TrackCVE |