Fossil 2.18 on Windows allows attackers to cause a denial of service (daemon crash) via an XSS payload in a ticket. This occurs because the ticket data is stored in a temporary file, and the product does not properly handle the absence of this file after Windows Defender has flagged it as malware.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://fossil-scm.org/home/doc/trunk/www/changes.wiki | vendor advisory |
https://gainsec.com/2022/07/27/cve-2022-34009/ | third party advisory exploit |