Vulnerabilites related to Security Roots Ltd - Dradis Community Edition and Dradis Professional Edition
CVE-2019-5925 (GCVE-0-2019-5925)
Vulnerability from cvelistv5
Published
2019-03-12 21:00
Modified
2024-08-04 20:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Cross-site scripting
Summary
Cross-site scripting vulnerability in Dradis Community Edition Dradis Community Edition v3.11 and earlier and Dradis Professional Edition v3.1.1 and earlier allow remote authenticated attackers to inject arbitrary web script or HTML via unspecified vectors.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Security Roots Ltd | Dradis Community Edition and Dradis Professional Edition |
Version: Dradis Community Edition v3.11 and earlier, Dradis Professional Edition v3.1.1 and earlier |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:09:23.796Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "JVN#40288903", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN40288903/index.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://dradisframework.com/ce/security_reports.html#fixed-3.11.1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Dradis Community Edition and Dradis Professional Edition", "vendor": "Security Roots Ltd", "versions": [ { "status": "affected", "version": "Dradis Community Edition v3.11 and earlier, Dradis Professional Edition v3.1.1 and earlier" } ] } ], "datePublic": "2019-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability in Dradis Community Edition Dradis Community Edition v3.11 and earlier and Dradis Professional Edition v3.1.1 and earlier allow remote authenticated attackers to inject arbitrary web script or HTML via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-12T20:57:01", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "name": "JVN#40288903", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN40288903/index.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://dradisframework.com/ce/security_reports.html#fixed-3.11.1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2019-5925", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Dradis Community Edition and Dradis Professional Edition", "version": { "version_data": [ { "version_value": "Dradis Community Edition v3.11 and earlier, Dradis Professional Edition v3.1.1 and earlier" } ] } } ] }, "vendor_name": "Security Roots Ltd" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting vulnerability in Dradis Community Edition Dradis Community Edition v3.11 and earlier and Dradis Professional Edition v3.1.1 and earlier allow remote authenticated attackers to inject arbitrary web script or HTML via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-site scripting" } ] } ] }, "references": { "reference_data": [ { "name": "JVN#40288903", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN40288903/index.html" }, { "name": "https://dradisframework.com/ce/security_reports.html#fixed-3.11.1", "refsource": "MISC", "url": "https://dradisframework.com/ce/security_reports.html#fixed-3.11.1" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2019-5925", "datePublished": "2019-03-12T21:00:00", "dateReserved": "2019-01-10T00:00:00", "dateUpdated": "2024-08-04T20:09:23.796Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }