CVE-2018-15641
Vulnerability from cvelistv5
Published
2020-12-22 16:25
Modified
2024-08-05 10:01
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) issue in web module in Odoo Community 11.0 through 14.0 and Odoo Enterprise 11.0 through 14.0, allows remote authenticated internal users to inject arbitrary web script in the browser of a victim via crafted calendar event attributes.
References
▼ | URL | Tags | |
---|---|---|---|
security@odoo.com | https://github.com/odoo/odoo/issues/63704 | Patch, Third Party Advisory |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:01:54.277Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/odoo/odoo/issues/63704" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Odoo Community", "vendor": "Odoo", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "11.0", "versionType": "custom" } ] }, { "product": "Odoo Enterprise", "vendor": "Odoo", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "11.0", "versionType": "custom" } ] }, { "product": "Odoo Community", "vendor": "Odoo", "versions": [ { "lessThanOrEqual": "14.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Odoo Enterprise", "vendor": "Odoo", "versions": [ { "lessThanOrEqual": "14.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "msg systems ag" }, { "lang": "en", "value": "Lauri Vakkala (Silverskin)" }, { "lang": "en", "value": "Bharath Kumar (Appsecco)" }, { "lang": "en", "value": "An\u0131l Y\u00fcksel" }, { "lang": "en", "value": "Aitor Fuentes (kr0no)" } ], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) issue in web module in Odoo Community 11.0 through 14.0 and Odoo Enterprise 11.0 through 14.0, allows remote authenticated internal users to inject arbitrary web script in the browser of a victim via crafted calendar event attributes." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-22T16:25:34", "orgId": "22c90092-d340-4fb8-a06e-f1193e012523", "shortName": "odoo" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/odoo/odoo/issues/63704" } ], "source": { "advisory": "ODOO-SA-2020-12-02", "discovery": "EXTERNAL" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@odoo.com", "ID": "CVE-2018-15641", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Odoo Community", "version": { "version_data": [ { "version_affected": "\u003e=", "version_value": "11.0" } ] } }, { "product_name": "Odoo Enterprise", "version": { "version_data": [ { "version_affected": "\u003e=", "version_value": "11.0" } ] } }, { "product_name": "Odoo Community", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "14.0" } ] } }, { "product_name": "Odoo Enterprise", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "14.0" } ] } } ] }, "vendor_name": "Odoo" } ] } }, "credit": [ { "lang": "eng", "value": "msg systems ag" }, { "lang": "eng", "value": "Lauri Vakkala (Silverskin)" }, { "lang": "eng", "value": "Bharath Kumar (Appsecco)" }, { "lang": "eng", "value": "An\u0131l Y\u00fcksel" }, { "lang": "eng", "value": "Aitor Fuentes (kr0no)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) issue in web module in Odoo Community 11.0 through 14.0 and Odoo Enterprise 11.0 through 14.0, allows remote authenticated internal users to inject arbitrary web script in the browser of a victim via crafted calendar event attributes." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": " CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/odoo/odoo/issues/63704", "refsource": "MISC", "url": "https://github.com/odoo/odoo/issues/63704" } ] }, "source": { "advisory": "ODOO-SA-2020-12-02", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "22c90092-d340-4fb8-a06e-f1193e012523", "assignerShortName": "odoo", "cveId": "CVE-2018-15641", "datePublished": "2020-12-22T16:25:34", "dateReserved": "2018-08-21T00:00:00", "dateUpdated": "2024-08-05T10:01:54.277Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-15641\",\"sourceIdentifier\":\"security@odoo.com\",\"published\":\"2020-12-22T17:15:12.940\",\"lastModified\":\"2020-12-22T19:40:37.993\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cross-site scripting (XSS) issue in web module in Odoo Community 11.0 through 14.0 and Odoo Enterprise 11.0 through 14.0, allows remote authenticated internal users to inject arbitrary web script in the browser of a victim via crafted calendar event attributes.\"},{\"lang\":\"es\",\"value\":\"Un problema de tipo cross-site scripting (XSS) en el m\u00f3dulo web en Odoo Community versiones 11.0 hasta 14.0 y Odoo Enterprise versiones 11.0 hasta 14.0, permite a usuarios internos autenticados remotos inyectar un script web arbitrario en el navegador de una v\u00edctima por medio de atributos de eventos de calendario dise\u00f1ados\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\",\"baseScore\":5.4,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":2.3,\"impactScore\":2.7}],\"cvssMetricV30\":[{\"source\":\"security@odoo.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\",\"baseScore\":6.3,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":2.1,\"impactScore\":4.2}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:S/C:N/I:P/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\",\"baseScore\":3.5},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":6.8,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]},{\"source\":\"security@odoo.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*\",\"versionStartIncluding\":\"11.0\",\"versionEndIncluding\":\"14.0\",\"matchCriteriaId\":\"4ED3084D-DF4C-486F-A161-ADCC24FF61F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:odoo:odoo:*:*:*:*:enterprise:*:*:*\",\"versionStartIncluding\":\"11.0\",\"versionEndIncluding\":\"14.0\",\"matchCriteriaId\":\"EBE9D00C-0BB2-4086-B6E3-C5AEC39070C1\"}]}]}],\"references\":[{\"url\":\"https://github.com/odoo/odoo/issues/63704\",\"source\":\"security@odoo.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.