Cross-site scripting (XSS) vulnerability in util/templatetags/djblets_js.py in Djblets before 0.7.30 and 0.8.x before 0.8.3 for Django, as used in Review Board, allows remote attackers to inject arbitrary web script or HTML via a JSON object, as demonstrated by the name field when changing a user name.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://seclists.org/oss-sec/2014/q2/494 | mailing list third party advisory vdb entry |
http://seclists.org/oss-sec/2014/q2/498 | mailing list third party advisory vdb entry |
http://www.securityfocus.com/bid/67932 | third party advisory vdb entry |
https://code.google.com/p/reviewboard/issues/detail?id=3406 | not applicable |
https://github.com/djblets/djblets/commit/77a68c03cd619a0996f3f37337b8c39ca6643d6e | patch issue tracking exploit |
http://secunia.com/advisories/58691 | third party advisory permissions required |
https://github.com/djblets/djblets/commit/e2c79117efd925636acd871a5f473512602243cf | patch issue tracking |
https://github.com/djblets/djblets/commit/50000d0bbb983fa8c097b588d06b64df8df483bd | patch issue tracking |