A vulnerability in Koji was found. An unsanitized input allows for an XSS attack. Javascript code from a malicious link could be reflected in the resulting web page. It is not expected to be able to submit an action or make a change in Koji due to existing XSS protections in the code
History

Tue, 24 Dec 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Dec 2024 03:30:00 +0000

Type Values Removed Values Added
Description A vulnerability in Koji was found. An unsanitized input allows for an XSS attack. Javascript code from a malicious link could be reflected in the resulting web page. It is not expected to be able to submit an action or make a change in Koji due to existing XSS protections in the code
Title Koji: escape html tag characters in the query string
Weaknesses CWE-116
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2024-12-24T03:25:27.815Z

Updated: 2024-12-24T15:43:15.164Z

Reserved: 2024-10-02T02:30:27.642Z

Link: CVE-2024-9427

cve-icon Vulnrichment

Updated: 2024-12-24T15:43:11.707Z

cve-icon NVD

Status : Received

Published: 2024-12-24T04:15:07.360

Modified: 2024-12-24T04:15:07.360

Link: CVE-2024-9427

cve-icon Redhat

No data.