Search criteria
3 vulnerabilities by layui
CVE-2024-47075 (GCVE-0-2024-47075)
Vulnerability from cvelistv5 – Published: 2024-09-26 17:08 – Updated: 2024-09-26 18:06
VLAI?
Summary
LayUI is a native minimalist modular Web UI component library. Versions prior to 2.9.17 have a DOM Clobbering vulnerability that can lead to Cross-site Scripting (XSS) on web pages where attacker-controlled HTML elements (e.g., `img` tags with unsanitized `name` attributes) are present. Version 2.9.17 fixes this issue.
Severity ?
6.4 (Medium)
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-47075",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-26T17:57:38.383879Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-26T18:06:22.177Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "layui",
"vendor": "layui",
"versions": [
{
"status": "affected",
"version": "\u003c 2.9.17"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "LayUI is a native minimalist modular Web UI component library. Versions prior to 2.9.17 have a DOM Clobbering vulnerability that can lead to Cross-site Scripting (XSS) on web pages where attacker-controlled HTML elements (e.g., `img` tags with unsanitized `name` attributes) are present. Version 2.9.17 fixes this issue."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-09-26T17:08:19.996Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/layui/layui/security/advisories/GHSA-j827-6rgf-9629",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/layui/layui/security/advisories/GHSA-j827-6rgf-9629"
},
{
"name": "https://github.com/layui/layui/commit/f756b41d63bf3d488a2cb042918638c9851bf2b0",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/layui/layui/commit/f756b41d63bf3d488a2cb042918638c9851bf2b0"
}
],
"source": {
"advisory": "GHSA-j827-6rgf-9629",
"discovery": "UNKNOWN"
},
"title": "DOM Clobbering gadgets found in layui that lead to Cross-site Scripting"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2024-47075",
"datePublished": "2024-09-26T17:08:19.996Z",
"dateReserved": "2024-09-17T17:42:37.029Z",
"dateUpdated": "2024-09-26T18:06:22.177Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-50550 (GCVE-0-2023-50550)
Vulnerability from cvelistv5 – Published: 2023-12-30 00:00 – Updated: 2024-08-02 22:16
VLAI?
Summary
layui up to v2.74 was discovered to contain a cross-site scripting (XSS) vulnerability via the data-content parameter.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T22:16:46.982Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://gitee.com/layui/layui/issues?utf8=%E2%9C%93\u0026state=all\u0026issue_search=xss"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "layui up to v2.74 was discovered to contain a cross-site scripting (XSS) vulnerability via the data-content parameter."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-12-30T15:12:00.475659",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://gitee.com/layui/layui/issues?utf8=%E2%9C%93\u0026state=all\u0026issue_search=xss"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2023-50550",
"datePublished": "2023-12-30T00:00:00",
"dateReserved": "2023-12-11T00:00:00",
"dateUpdated": "2024-08-02T22:16:46.982Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-3691 (GCVE-0-2023-3691)
Vulnerability from cvelistv5 – Published: 2023-07-16 16:31 – Updated: 2024-10-23 13:32
VLAI?
Summary
A vulnerability, which was classified as problematic, was found in layui up to v2.8.0-rc.16. This affects an unknown part of the component HTML Attribute Handler. The manipulation of the argument title leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 2.8.0 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-234237 was assigned to this vulnerability.
Severity ?
CWE
- CWE-79 - Cross Site Scripting
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | layui |
Affected:
v2.8.0-rc.0
Affected: v2.8.0-rc.1 Affected: v2.8.0-rc.2 Affected: v2.8.0-rc.3 Affected: v2.8.0-rc.4 Affected: v2.8.0-rc.5 Affected: v2.8.0-rc.6 Affected: v2.8.0-rc.7 Affected: v2.8.0-rc.8 Affected: v2.8.0-rc.9 Affected: v2.8.0-rc.10 Affected: v2.8.0-rc.11 Affected: v2.8.0-rc.12 Affected: v2.8.0-rc.13 Affected: v2.8.0-rc.14 Affected: v2.8.0-rc.15 Affected: v2.8.0-rc.16 |
Credits
VulDB Gitee Analyzer
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T07:01:57.392Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vdb-entry",
"technical-description",
"x_transferred"
],
"url": "https://vuldb.com/?id.234237"
},
{
"tags": [
"signature",
"permissions-required",
"x_transferred"
],
"url": "https://vuldb.com/?ctiid.234237"
},
{
"tags": [
"issue-tracking",
"x_transferred"
],
"url": "https://gitee.com/layui/layui/issues/I7HDXZ"
},
{
"tags": [
"patch",
"x_transferred"
],
"url": "https://gitee.com/layui/layui/tree/v2.8.0"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-3691",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-23T13:29:10.902803Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-23T13:32:23.255Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"modules": [
"HTML Attribute Handler"
],
"product": "layui",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "v2.8.0-rc.0"
},
{
"status": "affected",
"version": "v2.8.0-rc.1"
},
{
"status": "affected",
"version": "v2.8.0-rc.2"
},
{
"status": "affected",
"version": "v2.8.0-rc.3"
},
{
"status": "affected",
"version": "v2.8.0-rc.4"
},
{
"status": "affected",
"version": "v2.8.0-rc.5"
},
{
"status": "affected",
"version": "v2.8.0-rc.6"
},
{
"status": "affected",
"version": "v2.8.0-rc.7"
},
{
"status": "affected",
"version": "v2.8.0-rc.8"
},
{
"status": "affected",
"version": "v2.8.0-rc.9"
},
{
"status": "affected",
"version": "v2.8.0-rc.10"
},
{
"status": "affected",
"version": "v2.8.0-rc.11"
},
{
"status": "affected",
"version": "v2.8.0-rc.12"
},
{
"status": "affected",
"version": "v2.8.0-rc.13"
},
{
"status": "affected",
"version": "v2.8.0-rc.14"
},
{
"status": "affected",
"version": "v2.8.0-rc.15"
},
{
"status": "affected",
"version": "v2.8.0-rc.16"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "tool",
"value": "VulDB Gitee Analyzer"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in layui up to v2.8.0-rc.16. This affects an unknown part of the component HTML Attribute Handler. The manipulation of the argument title leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 2.8.0 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-234237 was assigned to this vulnerability."
},
{
"lang": "de",
"value": "Es wurde eine problematische Schwachstelle in layui bis v2.8.0-rc.16 gefunden. Es geht dabei um eine nicht klar definierte Funktion der Komponente HTML Attribute Handler. Durch die Manipulation des Arguments title mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Ein Aktualisieren auf die Version 2.8.0 vermag dieses Problem zu l\u00f6sen. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 4,
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Cross Site Scripting",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-10-23T15:29:35.450Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.234237"
},
{
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.234237"
},
{
"tags": [
"issue-tracking"
],
"url": "https://gitee.com/layui/layui/issues/I7HDXZ"
},
{
"tags": [
"patch"
],
"url": "https://gitee.com/layui/layui/tree/v2.8.0"
}
],
"timeline": [
{
"lang": "en",
"time": "2023-07-15T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2023-07-15T00:00:00.000Z",
"value": "CVE reserved"
},
{
"lang": "en",
"time": "2023-07-15T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2023-08-06T10:32:31.000Z",
"value": "VulDB entry last update"
}
],
"title": "layui HTML Attribute cross site scripting"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2023-3691",
"datePublished": "2023-07-16T16:31:02.909Z",
"dateReserved": "2023-07-15T16:34:37.981Z",
"dateUpdated": "2024-10-23T13:32:23.255Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}