[Japanese]
|
JVNDB-2020-000031
|
BookStack vulnerable to cross-site scripting
|
BookStack contains a cross-site scripting vulnerability (CWE-79).
Kenichi Okuno of Mitsui Bussan Secure Directions, Inc reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
|
CVSS V3 Severity: Base Metrics 5.4 (Medium) [IPA Score]
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: Required
- Scope: Changed
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
CVSS V2 Severity: Base Metrics 3.5 (Low) [IPA Score]
- Access Vector: Network
- Access Complexity: Medium
- Authentication: Single Instance
- Confidentiality Impact: None
- Integrity Impact: Partial
- Availability Impact: None
|
|
BookStack project
- BookStack versions prior to v0.29.2
|
|
An arbitrary script may be executed on the user's web browser.
|
[Update the Software]
Update the software to the latest version according to the information provided by the developer.
The developer states as follows;
After upgrading, The command php artisan bookstack:regenerate-comment-content should be ran to remove any pre-existing dangerous content.
|
BookStack project
|
- Cross-site Scripting(CWE-79) [IPA Evaluation]
|
- CVE-2020-11055
|
- JVN : JVN#41035278
- National Vulnerability Database (NVD) : CVE-2020-11055
|
- [2020/05/13]
Web page was published
|