مجال | 04/01/2023 10:20 | 28/01/2023 07:28 | 28/01/2023 07:34 |
---|
vendor | innologi | innologi | innologi |
name | appointments Extension | appointments Extension | appointments Extension |
version | <=2.0.5 | <=2.0.5 | <=2.0.5 |
platform | TYPO3 | TYPO3 | TYPO3 |
component | Appointment Handler | Appointment Handler | Appointment Handler |
argument | formfield | formfield | formfield |
cwe | 79 (سكربتات مشتركة) | 79 (سكربتات مشتركة) | 79 (سكربتات مشتركة) |
risk | 1 | 1 | 1 |
cvss3_vuldb_av | N | N | N |
cvss3_vuldb_ac | L | L | L |
cvss3_vuldb_ui | R | R | R |
cvss3_vuldb_s | U | U | U |
cvss3_vuldb_c | N | N | N |
cvss3_vuldb_i | L | L | L |
cvss3_vuldb_a | N | N | N |
cvss3_vuldb_rl | O | O | O |
cvss3_vuldb_rc | C | C | C |
identifier | 986d3cb34e5e086c6f04e061f600ffc5837abe7f | 986d3cb34e5e086c6f04e061f600ffc5837abe7f | 986d3cb34e5e086c6f04e061f600ffc5837abe7f |
url | https://github.com/innologi/typo3-appointments/commit/986d3cb34e5e086c6f04e061f600ffc5837abe7f | https://github.com/innologi/typo3-appointments/commit/986d3cb34e5e086c6f04e061f600ffc5837abe7f | https://github.com/innologi/typo3-appointments/commit/986d3cb34e5e086c6f04e061f600ffc5837abe7f |
name | ترقية | ترقية | ترقية |
upgrade_version | 2.0.6 | 2.0.6 | 2.0.6 |
upgrade_url | https://github.com/innologi/typo3-appointments/releases/tag/2.0.6 | https://github.com/innologi/typo3-appointments/releases/tag/2.0.6 | https://github.com/innologi/typo3-appointments/releases/tag/2.0.6 |
patch_name | 986d3cb34e5e086c6f04e061f600ffc5837abe7f | 986d3cb34e5e086c6f04e061f600ffc5837abe7f | 986d3cb34e5e086c6f04e061f600ffc5837abe7f |
patch_url | https://github.com/innologi/typo3-appointments/commit/986d3cb34e5e086c6f04e061f600ffc5837abe7f | https://github.com/innologi/typo3-appointments/commit/986d3cb34e5e086c6f04e061f600ffc5837abe7f | https://github.com/innologi/typo3-appointments/commit/986d3cb34e5e086c6f04e061f600ffc5837abe7f |
advisoryquote | [BUGFIX] Prevent XSS on various formfield values Also, use the standalone Fluid's htmlspecialchars VH instead of TYPO3's htmlentities VH. They're essentially the same, but going with the former increases the portability of our code. | [BUGFIX] Prevent XSS on various formfield values Also, use the standalone Fluid's htmlspecialchars VH instead of TYPO3's htmlentities VH. They're essentially the same, but going with the former increases the portability of our code. | [BUGFIX] Prevent XSS on various formfield values Also, use the standalone Fluid's htmlspecialchars VH instead of TYPO3's htmlentities VH. They're essentially the same, but going with the former increases the portability of our code. |
cve | CVE-2019-25094 | CVE-2019-25094 | CVE-2019-25094 |
responsible | VulDB | VulDB | VulDB |
date | 1672786800 (04/01/2023) | 1672786800 (04/01/2023) | 1672786800 (04/01/2023) |
type | Appointment Software | Appointment Software | Appointment Software |
cvss2_vuldb_av | N | N | N |
cvss2_vuldb_ac | L | L | L |
cvss2_vuldb_ci | N | N | N |
cvss2_vuldb_ii | P | P | P |
cvss2_vuldb_ai | N | N | N |
cvss2_vuldb_rc | C | C | C |
cvss2_vuldb_rl | OF | OF | OF |
cvss2_vuldb_au | S | S | S |
cvss2_vuldb_e | ND | ND | ND |
cvss3_vuldb_pr | L | L | L |
cvss3_vuldb_e | X | X | X |
cvss2_vuldb_basescore | 4.0 | 4.0 | 4.0 |
cvss2_vuldb_tempscore | 3.5 | 3.5 | 3.5 |
cvss3_vuldb_basescore | 3.5 | 3.5 | 3.5 |
cvss3_vuldb_tempscore | 3.4 | 3.4 | 3.4 |
cvss3_meta_basescore | 3.5 | 3.5 | 4.4 |
cvss3_meta_tempscore | 3.4 | 3.4 | 4.3 |
price_0day | $0-$5k | $0-$5k | $0-$5k |
cve_assigned | | 1672786800 (04/01/2023) | 1672786800 (04/01/2023) |
cve_nvd_summary | | A vulnerability, which was classified as problematic, was found in innologi appointments Extension up to 2.0.5. This affects an unknown part of the component Appointment Handler. The manipulation of the argument formfield leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 2.0.6 is able to address this issue. The name of the patch is 986d3cb34e5e086c6f04e061f600ffc5837abe7f. It is recommended to upgrade the affected component. The identifier VDB-217353 was assigned to this vulnerability. | A vulnerability, which was classified as problematic, was found in innologi appointments Extension up to 2.0.5. This affects an unknown part of the component Appointment Handler. The manipulation of the argument formfield leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 2.0.6 is able to address this issue. The name of the patch is 986d3cb34e5e086c6f04e061f600ffc5837abe7f. It is recommended to upgrade the affected component. The identifier VDB-217353 was assigned to this vulnerability. |
cvss3_nvd_av | | | N |
cvss3_nvd_ac | | | L |
cvss3_nvd_pr | | | N |
cvss3_nvd_ui | | | R |
cvss3_nvd_s | | | C |
cvss3_nvd_c | | | L |
cvss3_nvd_i | | | L |
cvss3_nvd_a | | | N |
cvss2_nvd_av | | | N |
cvss2_nvd_ac | | | L |
cvss2_nvd_au | | | S |
cvss2_nvd_ci | | | N |
cvss2_nvd_ii | | | P |
cvss2_nvd_ai | | | N |
cvss3_cna_av | | | N |
cvss3_cna_ac | | | L |
cvss3_cna_pr | | | L |
cvss3_cna_ui | | | R |
cvss3_cna_s | | | U |
cvss3_cna_c | | | N |
cvss3_cna_i | | | L |
cvss3_cna_a | | | N |
cve_cna | | | VulDB |
cvss2_nvd_basescore | | | 4.0 |
cvss3_nvd_basescore | | | 6.1 |
cvss3_cna_basescore | | | 3.5 |