Vulnerabilites related to dradisframework - Dradis
CVE-2019-19946 (GCVE-0-2019-19946)
Vulnerability from cvelistv5
Published
2020-03-16 17:31
Modified
2024-08-05 02:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The API in Dradis Pro 3.4.1 allows any user to extract the content of a project, even if this user is not part of the project team.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T02:32:10.481Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://know.bishopfox.com/advisories" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://know.bishopfox.com/advisories/dradis-pro-3-4-1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The API in Dradis Pro 3.4.1 allows any user to extract the content of a project, even if this user is not part of the project team." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-16T17:31:05", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://know.bishopfox.com/advisories" }, { "tags": [ "x_refsource_MISC" ], "url": "https://know.bishopfox.com/advisories/dradis-pro-3-4-1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-19946", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The API in Dradis Pro 3.4.1 allows any user to extract the content of a project, even if this user is not part of the project team." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://know.bishopfox.com/advisories", "refsource": "MISC", "url": "https://know.bishopfox.com/advisories" }, { "name": "https://know.bishopfox.com/advisories/dradis-pro-3-4-1", "refsource": "MISC", "url": "https://know.bishopfox.com/advisories/dradis-pro-3-4-1" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-19946", "datePublished": "2020-03-16T17:31:05", "dateReserved": "2019-12-23T00:00:00", "dateUpdated": "2024-08-05T02:32:10.481Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-50458 (GCVE-0-2023-50458)
Vulnerability from cvelistv5
Published
2025-07-10 00:00
Modified
2025-07-10 13:13
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-1230 - Exposure of Sensitive Information Through Metadata
Summary
In Dradis before 4.11.0, the Output Console shows a job queue that may contain information about other users' jobs.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
dradisframework | Dradis |
Version: 0 ≤ |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-50458", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-07-10T13:13:36.860229Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-10T13:13:48.494Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Dradis", "vendor": "dradisframework", "versions": [ { "lessThan": "4.11.0", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dradisframework:dradis:*:*:*:*:*:*:*:*", "versionEndExcluding": "4.11.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "In Dradis before 4.11.0, the Output Console shows a job queue that may contain information about other users\u0027 jobs." } ], "metrics": [ { "cvssV3_1": { "baseScore": 3.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1230", "description": "CWE-1230 Exposure of Sensitive Information Through Metadata", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-10T03:24:48.095Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://github.com/dradis/dradis-ce/tags" }, { "url": "https://securiteam.io/2025/07/03/cve-2023-50458-dradis-information-disclosure-output-console/" } ], "x_generator": { "engine": "enrichogram 0.0.1" } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-50458", "datePublished": "2025-07-10T00:00:00.000Z", "dateReserved": "2023-12-10T00:00:00.000Z", "dateUpdated": "2025-07-10T13:13:48.494Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-50786 (GCVE-0-2023-50786)
Vulnerability from cvelistv5
Published
2025-07-05 00:00
Modified
2025-07-07 18:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-294 - Authentication Bypass by Capture-replay
Summary
Dradis through 4.16.0 allows referencing external images (resources) over HTTPS, instead of forcing the use of embedded (uploaded) images. This can be leveraged by an authorized author to attempt to steal the Net-NTLM hashes of other authors on a Windows domain network.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
dradisframework | Dradis |
Version: 0 ≤ 4.16.0 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-50786", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-07-07T18:33:29.665087Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-07T18:35:07.867Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://securiteam.io/2025/07/04/cve-2023-50786-dradis-ntlm-theft-vulnerability/" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Dradis", "vendor": "dradisframework", "versions": [ { "lessThanOrEqual": "4.16.0", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dradisframework:dradis:*:*:*:*:*:*:*:*", "versionEndIncluding": "4.16.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "Dradis through 4.16.0 allows referencing external images (resources) over HTTPS, instead of forcing the use of embedded (uploaded) images. This can be leveraged by an authorized author to attempt to steal the Net-NTLM hashes of other authors on a Windows domain network." } ], "metrics": [ { "cvssV3_1": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-294", "description": "CWE-294 Authentication Bypass by Capture-replay", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-05T03:06:38.089Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://dradis.com/" }, { "url": "https://dradis.com/ce" }, { "url": "https://securiteam.io/2025/07/04/cve-2023-50786-dradis-ntlm-theft-vulnerability/" } ], "x_generator": { "engine": "enrichogram 0.0.1" } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-50786", "datePublished": "2025-07-05T00:00:00.000Z", "dateReserved": "2023-12-14T00:00:00.000Z", "dateUpdated": "2025-07-07T18:35:07.867Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-30028 (GCVE-0-2022-30028)
Vulnerability from cvelistv5
Published
2022-06-24 16:27
Modified
2024-08-03 06:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Dradis Professional Edition before 4.3.0 allows attackers to change an account password via reusing a password reset token.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:40:47.451Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://dradisframework.com/ce/security_reports.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Dradis Professional Edition before 4.3.0 allows attackers to change an account password via reusing a password reset token." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-24T16:27:52", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://dradisframework.com/ce/security_reports.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-30028", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Dradis Professional Edition before 4.3.0 allows attackers to change an account password via reusing a password reset token." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://dradisframework.com/ce/security_reports.html", "refsource": "MISC", "url": "https://dradisframework.com/ce/security_reports.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-30028", "datePublished": "2022-06-24T16:27:52", "dateReserved": "2022-05-02T00:00:00", "dateUpdated": "2024-08-03T06:40:47.451Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-5925 (GCVE-0-2019-5925)
Vulnerability from cvelistv5
Published
2019-03-12 21:00
Modified
2024-08-04 20:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Cross-site scripting
Summary
Cross-site scripting vulnerability in Dradis Community Edition Dradis Community Edition v3.11 and earlier and Dradis Professional Edition v3.1.1 and earlier allow remote authenticated attackers to inject arbitrary web script or HTML via unspecified vectors.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Security Roots Ltd | Dradis Community Edition and Dradis Professional Edition |
Version: Dradis Community Edition v3.11 and earlier, Dradis Professional Edition v3.1.1 and earlier |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:09:23.796Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "JVN#40288903", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN40288903/index.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://dradisframework.com/ce/security_reports.html#fixed-3.11.1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Dradis Community Edition and Dradis Professional Edition", "vendor": "Security Roots Ltd", "versions": [ { "status": "affected", "version": "Dradis Community Edition v3.11 and earlier, Dradis Professional Edition v3.1.1 and earlier" } ] } ], "datePublic": "2019-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability in Dradis Community Edition Dradis Community Edition v3.11 and earlier and Dradis Professional Edition v3.1.1 and earlier allow remote authenticated attackers to inject arbitrary web script or HTML via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-12T20:57:01", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "name": "JVN#40288903", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN40288903/index.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://dradisframework.com/ce/security_reports.html#fixed-3.11.1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2019-5925", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Dradis Community Edition and Dradis Professional Edition", "version": { "version_data": [ { "version_value": "Dradis Community Edition v3.11 and earlier, Dradis Professional Edition v3.1.1 and earlier" } ] } } ] }, "vendor_name": "Security Roots Ltd" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting vulnerability in Dradis Community Edition Dradis Community Edition v3.11 and earlier and Dradis Professional Edition v3.1.1 and earlier allow remote authenticated attackers to inject arbitrary web script or HTML via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-site scripting" } ] } ] }, "references": { "reference_data": [ { "name": "JVN#40288903", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN40288903/index.html" }, { "name": "https://dradisframework.com/ce/security_reports.html#fixed-3.11.1", "refsource": "MISC", "url": "https://dradisframework.com/ce/security_reports.html#fixed-3.11.1" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2019-5925", "datePublished": "2019-03-12T21:00:00", "dateReserved": "2019-01-10T00:00:00", "dateUpdated": "2024-08-04T20:09:23.796Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-31223 (GCVE-0-2023-31223)
Vulnerability from cvelistv5
Published
2023-04-25 00:00
Modified
2025-05-30 16:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Dradis before 4.8.0 allows persistent XSS by authenticated author users, related to avatars.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:53:29.682Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://dradisframework.com/ce/security_reports.html#fixed-4.8.0" }, { "tags": [ "x_transferred" ], "url": "https://excellium-services.com/cert-xlm-advisory/cve-2023-31223/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-31223", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-03T19:37:43.214005Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-03T19:38:01.759Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Dradis before 4.8.0 allows persistent XSS by authenticated author users, related to avatars." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AC:L/AV:N/A:N/C:H/I:H/PR:L/S:C/UI:R", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-30T16:02:47.626Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://dradisframework.com/ce/security_reports.html#fixed-4.8.0" }, { "url": "https://excellium-services.com/cert-xlm-advisory/cve-2023-31223/" }, { "url": "https://cds.thalesgroup.com/en/tcs-cert/CVE-2023-31223" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-31223", "datePublished": "2023-04-25T00:00:00.000Z", "dateReserved": "2023-04-25T00:00:00.000Z", "dateUpdated": "2025-05-30T16:02:47.626Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2022-06-24 17:15
Modified
2024-11-21 07:02
Severity ?
Summary
Dradis Professional Edition before 4.3.0 allows attackers to change an account password via reusing a password reset token.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://dradisframework.com/ce/security_reports.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://dradisframework.com/ce/security_reports.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
dradisframework | dradis | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dradisframework:dradis:*:*:*:*:professional:*:*:*", "matchCriteriaId": "4AFA049F-AEFB-4362-AC07-455D027BBAFE", "versionEndExcluding": "4.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dradis Professional Edition before 4.3.0 allows attackers to change an account password via reusing a password reset token." }, { "lang": "es", "value": "Dradis Professional Edition versiones anteriores a 4.3.0, permite a atacantes cambiar la contrase\u00f1a de una cuenta por medio del re\u00faso de un token de restablecimiento de contrase\u00f1a" } ], "id": "CVE-2022-30028", "lastModified": "2024-11-21T07:02:06.170", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-06-24T17:15:08.807", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://dradisframework.com/ce/security_reports.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://dradisframework.com/ce/security_reports.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-362" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-04-25 23:15
Modified
2025-05-30 16:15
Severity ?
8.7 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Summary
Dradis before 4.8.0 allows persistent XSS by authenticated author users, related to avatars.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
dradisframework | dradis | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dradisframework:dradis:*:*:*:*:*:*:*:*", "matchCriteriaId": "8988FEBD-6558-4753-B319-095CF5504732", "versionEndExcluding": "4.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dradis before 4.8.0 allows persistent XSS by authenticated author users, related to avatars." } ], "id": "CVE-2023-31223", "lastModified": "2025-05-30T16:15:34.623", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 5.8, "source": "cve@mitre.org", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-04-25T23:15:09.090", "references": [ { "source": "cve@mitre.org", "url": "https://cds.thalesgroup.com/en/tcs-cert/CVE-2023-31223" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://dradisframework.com/ce/security_reports.html#fixed-4.8.0" }, { "source": "cve@mitre.org", "url": "https://excellium-services.com/cert-xlm-advisory/cve-2023-31223/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://dradisframework.com/ce/security_reports.html#fixed-4.8.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://excellium-services.com/cert-xlm-advisory/cve-2023-31223/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2020-03-16 18:15
Modified
2024-11-21 04:35
Severity ?
Summary
The API in Dradis Pro 3.4.1 allows any user to extract the content of a project, even if this user is not part of the project team.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://know.bishopfox.com/advisories | Third Party Advisory | |
cve@mitre.org | https://know.bishopfox.com/advisories/dradis-pro-3-4-1 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://know.bishopfox.com/advisories | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://know.bishopfox.com/advisories/dradis-pro-3-4-1 | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
dradisframework | dradis | 3.4.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dradisframework:dradis:3.4.1:*:*:*:professional:*:*:*", "matchCriteriaId": "0D25521C-73AD-4B0D-BC37-66EAC212F3ED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The API in Dradis Pro 3.4.1 allows any user to extract the content of a project, even if this user is not part of the project team." }, { "lang": "es", "value": "La API en Dradis Pro versi\u00f3n 3.4.1, permite a cualquier usuario extraer el contenido de un proyecto, inclusive si este usuario no es parte del equipo del proyecto." } ], "id": "CVE-2019-19946", "lastModified": "2024-11-21T04:35:43.003", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-16T18:15:12.277", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://know.bishopfox.com/advisories" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://know.bishopfox.com/advisories/dradis-pro-3-4-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://know.bishopfox.com/advisories" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://know.bishopfox.com/advisories/dradis-pro-3-4-1" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-639" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-03-12 22:29
Modified
2024-11-21 04:45
Severity ?
Summary
Cross-site scripting vulnerability in Dradis Community Edition Dradis Community Edition v3.11 and earlier and Dradis Professional Edition v3.1.1 and earlier allow remote authenticated attackers to inject arbitrary web script or HTML via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | http://jvn.jp/en/jp/JVN40288903/index.html | Third Party Advisory | |
vultures@jpcert.or.jp | https://dradisframework.com/ce/security_reports.html#fixed-3.11.1 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://jvn.jp/en/jp/JVN40288903/index.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://dradisframework.com/ce/security_reports.html#fixed-3.11.1 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
dradisframework | dradis | * | |
dradisframework | dradis | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dradisframework:dradis:*:*:*:*:professional:*:*:*", "matchCriteriaId": "93438ADC-BFC4-4D17-A072-BB4A70090497", "versionEndIncluding": "3.1.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:dradisframework:dradis:*:*:*:*:community:*:*:*", "matchCriteriaId": "A7656A5D-2E64-4A78-9332-8C88B778E79B", "versionEndIncluding": "3.11", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability in Dradis Community Edition Dradis Community Edition v3.11 and earlier and Dradis Professional Edition v3.1.1 and earlier allow remote authenticated attackers to inject arbitrary web script or HTML via unspecified vectors." }, { "lang": "es", "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) en Dradis Community Edition, en versiones v3.11 y anteriores, y en Dradis Professional Edition, en versiones v3.1.1 y anteriores, permite a los atacantes autenticados inyectar scripts web o HTML arbitrarios mediante vectores sin especificar." } ], "id": "CVE-2019-5925", "lastModified": "2024-11-21T04:45:45.453", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-03-12T22:29:01.270", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "http://jvn.jp/en/jp/JVN40288903/index.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://dradisframework.com/ce/security_reports.html#fixed-3.11.1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://jvn.jp/en/jp/JVN40288903/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://dradisframework.com/ce/security_reports.html#fixed-3.11.1" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }