Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:logpoint:siem:*:*:*:*:*:*:*:*", "matchCriteriaId": "0CA92BDA-28DF-48A6-8FDF-93B959F8CE3E", "versionEndExcluding": "7.3.0", "versionStartIncluding": "6.10.0", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "The Jinja templating in Logpoint SIEM 6.10.0 through 7.x before 7.3.0 does not correctly sanitize log data being displayed when using a custom Jinja template in the Alert view. A remote attacker can craft a cross-site scripting (XSS) payload and send it to any system or device that sends logs to the SIEM. If an alert is created, the payload will execute upon the alert data being viewed with that template, which can lead to sensitive data disclosure."}, {"lang": "es", "value": "La plantilla de Jinja en Logpoint SIEM 6.10.0 a 7.x anterior a 7.3.0 no sanitiza correctamente los datos de registro que se muestran cuando se utiliza una plantilla de Jinja personalizada en la vista de alerta. Un atacante remoto puede crear un payload de Cross-Site Scripting (XSS) y enviarla a cualquier sistema o dispositivo que env\u00ede registros al SIEM. Si se crea una alerta, el payload se ejecutar\u00e1 cuando los datos de la alerta se vean con esa plantilla, lo que puede dar lugar a la divulgaci\u00f3n de datos confidenciales."}], "id": "CVE-2023-49950", "lastModified": "2024-11-21T08:34:04.020", "metrics": {"cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1"}, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2024-02-03T09:15:11.193", "references": [{"source": "cve@mitre.org", "tags": ["Exploit"], "url": "https://github.com/shrikeinfosec/cve-2023-49950/blob/main/cve-2023-49950.md"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://servicedesk.logpoint.com/hc/en-us/articles/14124495377437-Stored-XSS-Vulnerability-in-Alerts-via-Log-Injection"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"], "url": "https://github.com/shrikeinfosec/cve-2023-49950/blob/main/cve-2023-49950.md"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://servicedesk.logpoint.com/hc/en-us/articles/14124495377437-Stored-XSS-Vulnerability-in-Alerts-via-Log-Injection"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-79"}], "source": "nvd@nist.gov", "type": "Primary"}]}