An issue was discovered in the Gantt-Chart module before 5.5.5 for Jira. Due to missing validation of user input, it is vulnerable to a persistent XSS attack. An attacker can embed the attack vectors in the dashboard of other users. To exploit this vulnerability, an attacker has to be authenticated.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://marketplace.atlassian.com/apps/28997/gantt-chart-for-jira?hosting=cloud&tab=overview | third party advisory product |
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-030.txt | third party advisory exploit |
http://seclists.org/fulldisclosure/2020/Aug/1 | mailing list exploit third party advisory |
http://packetstormsecurity.com/files/158752/Gantt-Chart-For-Jira-5.5.4-Cross-Site-Scripting.html | exploit vdb entry third party advisory |