Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <e1f1ca85-d911-724b-e9b5-ef5e8132c074@chbi.eu>
Date: Fri, 29 Sep 2017 19:29:07 +0200
From: chbi@...i.eu
To: oss-security@...ts.openwall.com
Subject: Re: Stored XSS vulnerability in Tine 2.0 Community
 Edition <= 2017.08.3


> Stored XSS vulnerability via IMG tag at "History" of Profile, Calendar,
> Tasks and CRM allows an authenticated user to inject JavaScript which is
> triggered by the application administrator and other users.

CVE-2017-14922 has been assigned.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14922


> Stored XSS vulnerability via IMG tag at "Leadname" of CRM allows an
> authenticated user to inject JavaScript which is triggered by the
> application administrator and other users.

CVE-2017-14923 has been assigned.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14923


> Stored XSS vulnerability via IMG tag at "Filename" of Filemanager allows
> an authenticated user to inject JavaScript which is triggered by the
> application administrator and other users.

CVE-2017-14921 has been assigned.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14921


-- 
chbi
https://chbi.eu

GPG: 3DE9 9187 4BE9 EAE6 3CA8  DC20 BA7B 93F9 9037 AE7E
     https://chbi.eu/chbi.asc



Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.