A vulnerability in Koji was found. An unsanitized input allows for an XSS attack. Javascript code from a malicious link could be reflected in the resulting web page. It is not expected to be able to submit an action or make a change in Koji due to existing XSS protections in the code
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2316047 |
History
Tue, 24 Dec 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 24 Dec 2024 03:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in Koji was found. An unsanitized input allows for an XSS attack. Javascript code from a malicious link could be reflected in the resulting web page. It is not expected to be able to submit an action or make a change in Koji due to existing XSS protections in the code | |
Title | Koji: escape html tag characters in the query string | |
Weaknesses | CWE-116 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2024-12-24T03:25:27.815Z
Updated: 2024-12-24T15:43:15.164Z
Reserved: 2024-10-02T02:30:27.642Z
Link: CVE-2024-9427
Vulnrichment
Updated: 2024-12-24T15:43:11.707Z
NVD
Status : Received
Published: 2024-12-24T04:15:07.360
Modified: 2024-12-24T04:15:07.360
Link: CVE-2024-9427
Redhat
No data.