Description
The "reset password" login page accepted an HTML injection via URL parameters. This has already been rectified via patch, and as such it cannot be demonstrated via Demo site link. Those interested to see the vulnerability may spin up a http://localhost:8082/dotAdmin/#/public/login?resetEmailSent=true&resetEmail=%3Ch1%3E%3Ca%20href%3D%22https:%2F%2Fgoogle.com%22%3ECLICK%20ME%3C%2Fa%3E%3C%2Fh1%3E This will result in a view along these lines: * OWASP Top 10 - A03: Injection * CVSS Score: 5.4 * AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator * https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N&... https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator
INFO
Published Date :
2024-07-25T21:17:49.359Z
Last Modified :
2024-08-01T20:26:57.098Z
Source :
dotCMS
AFFECTED PRODUCTS
The following products are affected by CVE-2024-3938 vulnerability.
| Vendors | Products |
|---|---|
| Dotcms |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2024-3938.
| URL | Resource |
|---|---|
| https://www.dotcms.com/security/SI-71 |
|