CVE-2024-5165 (GCVE-0-2024-5165)

Vulnerability from cvelistv5 – Published: 2024-05-23 09:56 – Updated: 2024-08-01 21:03
VLAI?
Title
Eclipse Ditto User Interface vulnerable to XSS due to Improper Neutralization of Input
Summary
In Eclipse Ditto versions 3.0.0 to 3.5.5, the user input of several input fields of the Eclipse Ditto Explorer User Interface https://eclipse.dev/ditto/user-interface.html was not properly neutralized and thus vulnerable to both Reflected and Stored XSS (Cross Site Scripting). Several inputs were not persisted at the backend of Eclipse Ditto, but only in local browser storage to save settings of "environments" of the UI and e.g. the last performed "search queries", resulting in a "Reflected XSS" vulnerability. However, several other inputs were persisted at the backend of Eclipse Ditto, leading to a "Stored XSS" vulnerability. Those mean that authenticated and authorized users at Eclipse Ditto can persist Things in Ditto which can - when being displayed by other users also being authorized to see those Things in the Eclipse Ditto UI - cause scripts to be executed in the browser of other users.
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Assigner
Impacted products
Vendor Product Version
Eclipse Foundation Eclipse Ditto Affected: 0 , < 3.4.6 (semver)
Affected: 3.5.0 , < 3.5.6 (semver)
Create a notification for this product.
Credits
Manuel Sommer Quirin Zießler
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-5165",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-05-23T19:50:06.370667Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T18:02:58.332Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:03:11.075Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/23"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/211"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/210"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/209"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/207"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/204"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/202"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/201"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Eclipse Ditto",
          "vendor": "Eclipse Foundation",
          "versions": [
            {
              "lessThan": "3.4.6",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThan": "3.5.6",
              "status": "affected",
              "version": "3.5.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Manuel Sommer"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "Quirin Zie\u00dfler"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cdiv\u003eIn Eclipse Ditto versions 3.0.0 to 3.5.5, the user input of several input fields of the Eclipse \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://eclipse.dev/ditto/user-interface.html\"\u003eDitto Explorer User Interface\u003c/a\u003e was not properly neutralized and thus vulnerable to both Reflected and Stored XSS (Cross Site Scripting).\u003c/div\u003e\u003cdiv\u003e\u003cbr\u003e\u003c/div\u003e\nSeveral inputs were not persisted at the backend of Eclipse Ditto, but only in local browser storage to save settings of \"environments\" of the UI and e.g. the last performed \"search queries\", resulting in a \"Reflected XSS\" vulnerability.\u003cbr\u003e\u003cdiv\u003e\u003cbr\u003e\n\u003c/div\u003e\u003cdiv\u003eHowever, several other inputs were persisted at the backend of Eclipse Ditto, leading to a \"Stored XSS\" vulnerability. Those mean that authenticated and authorized users at Eclipse Ditto can persist Things in Ditto which can - when being displayed by other users also being authorized to see those Things in the Eclipse Ditto UI - cause scripts to be executed in the browser of other users.\u003c/div\u003e"
            }
          ],
          "value": "In Eclipse Ditto versions 3.0.0 to 3.5.5, the user input of several input fields of the Eclipse  Ditto Explorer User Interface https://eclipse.dev/ditto/user-interface.html  was not properly neutralized and thus vulnerable to both Reflected and Stored XSS (Cross Site Scripting).\n\n\n\n\n\nSeveral inputs were not persisted at the backend of Eclipse Ditto, but only in local browser storage to save settings of \"environments\" of the UI and e.g. the last performed \"search queries\", resulting in a \"Reflected XSS\" vulnerability.\n\n\n\n\nHowever, several other inputs were persisted at the backend of Eclipse Ditto, leading to a \"Stored XSS\" vulnerability. Those mean that authenticated and authorized users at Eclipse Ditto can persist Things in Ditto which can - when being displayed by other users also being authorized to see those Things in the Eclipse Ditto UI - cause scripts to be executed in the browser of other users."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-23T09:56:31.696Z",
        "orgId": "e51fbebd-6053-4e49-959f-1b94eeb69a2c",
        "shortName": "eclipse"
      },
      "references": [
        {
          "url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/23"
        },
        {
          "url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/211"
        },
        {
          "url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/210"
        },
        {
          "url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/209"
        },
        {
          "url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/207"
        },
        {
          "url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/204"
        },
        {
          "url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/202"
        },
        {
          "url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/201"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Eclipse Ditto User Interface vulnerable to XSS due to Improper Neutralization of Input",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "e51fbebd-6053-4e49-959f-1b94eeb69a2c",
    "assignerShortName": "eclipse",
    "cveId": "CVE-2024-5165",
    "datePublished": "2024-05-23T09:56:31.696Z",
    "dateReserved": "2024-05-21T09:41:41.448Z",
    "dateUpdated": "2024-08-01T21:03:11.075Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "epss": {
      "cve": "CVE-2024-5165",
      "date": "2026-04-25",
      "epss": "0.00882",
      "percentile": "0.75456"
    },
    "fkie_nvd": {
      "descriptions": "[{\"lang\": \"en\", \"value\": \"In Eclipse Ditto versions 3.0.0 to 3.5.5, the user input of several input fields of the Eclipse  Ditto Explorer User Interface https://eclipse.dev/ditto/user-interface.html  was not properly neutralized and thus vulnerable to both Reflected and Stored XSS (Cross Site Scripting).\\n\\n\\n\\n\\n\\nSeveral inputs were not persisted at the backend of Eclipse Ditto, but only in local browser storage to save settings of \\\"environments\\\" of the UI and e.g. the last performed \\\"search queries\\\", resulting in a \\\"Reflected XSS\\\" vulnerability.\\n\\n\\n\\n\\nHowever, several other inputs were persisted at the backend of Eclipse Ditto, leading to a \\\"Stored XSS\\\" vulnerability. Those mean that authenticated and authorized users at Eclipse Ditto can persist Things in Ditto which can - when being displayed by other users also being authorized to see those Things in the Eclipse Ditto UI - cause scripts to be executed in the browser of other users.\"}, {\"lang\": \"es\", \"value\": \"En las versiones 3.0.0 a 3.5.5 de Eclipse Ditto, la entrada del usuario de varios campos de entrada de la interfaz de usuario de Eclipse Ditto Explorer https://eclipse.dev/ditto/user-interface.html no se neutraliz\\u00f3 adecuadamente y, por lo tanto, fue vulnerable a ambos. XSS reflejado y almacenado (Cross Site Scripting). Varias entradas no persistieron en el backend de Eclipse Ditto, sino solo en el almacenamiento del navegador local para guardar la configuraci\\u00f3n de los \\\"entornos\\\" de la interfaz de usuario y, por ejemplo, las \\u00faltimas \\\"consultas de b\\u00fasqueda\\\" realizadas, lo que result\\u00f3 en una vulnerabilidad \\\"XSS reflejada\\\". Sin embargo, varias otras entradas persistieron en el backend de Eclipse Ditto, lo que provoc\\u00f3 una vulnerabilidad \\\"Stored XSS\\\". Esto significa que los usuarios autenticados y autorizados en Eclipse Ditto pueden conservar cosas en Ditto que pueden, cuando son mostradas por otros usuarios que tambi\\u00e9n est\\u00e1n autorizados a ver esas cosas en la interfaz de usuario de Eclipse Ditto, provocar que se ejecuten scripts en el navegador de otros usuarios.\"}]",
      "id": "CVE-2024-5165",
      "lastModified": "2024-11-21T09:47:06.567",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"emo@eclipse.org\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 3.6}]}",
      "published": "2024-05-23T10:15:10.183",
      "references": "[{\"url\": \"https://gitlab.eclipse.org/security/cve-assignement/-/issues/23\", \"source\": \"emo@eclipse.org\"}, {\"url\": \"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/201\", \"source\": \"emo@eclipse.org\"}, {\"url\": \"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/202\", \"source\": \"emo@eclipse.org\"}, {\"url\": \"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/204\", \"source\": \"emo@eclipse.org\"}, {\"url\": \"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/207\", \"source\": \"emo@eclipse.org\"}, {\"url\": \"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/209\", \"source\": \"emo@eclipse.org\"}, {\"url\": \"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/210\", \"source\": \"emo@eclipse.org\"}, {\"url\": \"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/211\", \"source\": \"emo@eclipse.org\"}, {\"url\": \"https://gitlab.eclipse.org/security/cve-assignement/-/issues/23\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/201\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/202\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/204\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/207\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/209\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/210\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/211\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "emo@eclipse.org",
      "vulnStatus": "Awaiting Analysis",
      "weaknesses": "[{\"source\": \"emo@eclipse.org\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-5165\",\"sourceIdentifier\":\"emo@eclipse.org\",\"published\":\"2024-05-23T10:15:10.183\",\"lastModified\":\"2025-01-31T14:46:11.070\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In Eclipse Ditto versions 3.0.0 to 3.5.5, the user input of several input fields of the Eclipse  Ditto Explorer User Interface https://eclipse.dev/ditto/user-interface.html  was not properly neutralized and thus vulnerable to both Reflected and Stored XSS (Cross Site Scripting).\\n\\n\\n\\n\\n\\nSeveral inputs were not persisted at the backend of Eclipse Ditto, but only in local browser storage to save settings of \\\"environments\\\" of the UI and e.g. the last performed \\\"search queries\\\", resulting in a \\\"Reflected XSS\\\" vulnerability.\\n\\n\\n\\n\\nHowever, several other inputs were persisted at the backend of Eclipse Ditto, leading to a \\\"Stored XSS\\\" vulnerability. Those mean that authenticated and authorized users at Eclipse Ditto can persist Things in Ditto which can - when being displayed by other users also being authorized to see those Things in the Eclipse Ditto UI - cause scripts to be executed in the browser of other users.\"},{\"lang\":\"es\",\"value\":\"En las versiones 3.0.0 a 3.5.5 de Eclipse Ditto, la entrada del usuario de varios campos de entrada de la interfaz de usuario de Eclipse Ditto Explorer https://eclipse.dev/ditto/user-interface.html no se neutraliz\u00f3 adecuadamente y, por lo tanto, fue vulnerable a ambos. XSS reflejado y almacenado (Cross Site Scripting). Varias entradas no persistieron en el backend de Eclipse Ditto, sino solo en el almacenamiento del navegador local para guardar la configuraci\u00f3n de los \\\"entornos\\\" de la interfaz de usuario y, por ejemplo, las \u00faltimas \\\"consultas de b\u00fasqueda\\\" realizadas, lo que result\u00f3 en una vulnerabilidad \\\"XSS reflejada\\\". Sin embargo, varias otras entradas persistieron en el backend de Eclipse Ditto, lo que provoc\u00f3 una vulnerabilidad \\\"Stored XSS\\\". Esto significa que los usuarios autenticados y autorizados en Eclipse Ditto pueden conservar cosas en Ditto que pueden, cuando son mostradas por otros usuarios que tambi\u00e9n est\u00e1n autorizados a ver esas cosas en la interfaz de usuario de Eclipse Ditto, provocar que se ejecuten scripts en el navegador de otros usuarios.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"emo@eclipse.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":5.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.3,\"impactScore\":2.7}]},\"weaknesses\":[{\"source\":\"emo@eclipse.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eclipse:ditto:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.0.0\",\"versionEndExcluding\":\"3.5.6\",\"matchCriteriaId\":\"6F6F2718-0B15-4655-B194-48D978E66BFA\"}]}]}],\"references\":[{\"url\":\"https://gitlab.eclipse.org/security/cve-assignement/-/issues/23\",\"source\":\"emo@eclipse.org\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/201\",\"source\":\"emo@eclipse.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/202\",\"source\":\"emo@eclipse.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/204\",\"source\":\"emo@eclipse.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/207\",\"source\":\"emo@eclipse.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/209\",\"source\":\"emo@eclipse.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/210\",\"source\":\"emo@eclipse.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/211\",\"source\":\"emo@eclipse.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://gitlab.eclipse.org/security/cve-assignement/-/issues/23\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/201\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/202\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/204\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/207\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/209\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/210\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/211\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://gitlab.eclipse.org/security/cve-assignement/-/issues/23\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/211\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/210\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/209\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/207\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/204\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/202\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/201\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T21:03:11.075Z\"}}, {\"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-5165\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-05-23T19:50:06.370667Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-05-23T19:51:13.326Z\"}, \"title\": \"CISA ADP Vulnrichment\"}], \"cna\": {\"title\": \"Eclipse Ditto User Interface vulnerable to XSS due to Improper Neutralization of Input\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Manuel Sommer\"}, {\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Quirin Zie\\u00dfler\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Eclipse Foundation\", \"product\": \"Eclipse Ditto\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"3.4.6\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"3.5.0\", \"lessThan\": \"3.5.6\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://gitlab.eclipse.org/security/cve-assignement/-/issues/23\"}, {\"url\": \"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/211\"}, {\"url\": \"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/210\"}, {\"url\": \"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/209\"}, {\"url\": \"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/207\"}, {\"url\": \"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/204\"}, {\"url\": \"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/202\"}, {\"url\": \"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/201\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In Eclipse Ditto versions 3.0.0 to 3.5.5, the user input of several input fields of the Eclipse  Ditto Explorer User Interface https://eclipse.dev/ditto/user-interface.html  was not properly neutralized and thus vulnerable to both Reflected and Stored XSS (Cross Site Scripting).\\n\\n\\n\\n\\n\\nSeveral inputs were not persisted at the backend of Eclipse Ditto, but only in local browser storage to save settings of \\\"environments\\\" of the UI and e.g. the last performed \\\"search queries\\\", resulting in a \\\"Reflected XSS\\\" vulnerability.\\n\\n\\n\\n\\nHowever, several other inputs were persisted at the backend of Eclipse Ditto, leading to a \\\"Stored XSS\\\" vulnerability. Those mean that authenticated and authorized users at Eclipse Ditto can persist Things in Ditto which can - when being displayed by other users also being authorized to see those Things in the Eclipse Ditto UI - cause scripts to be executed in the browser of other users.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cdiv\u003eIn Eclipse Ditto versions 3.0.0 to 3.5.5, the user input of several input fields of the Eclipse \u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://eclipse.dev/ditto/user-interface.html\\\"\u003eDitto Explorer User Interface\u003c/a\u003e was not properly neutralized and thus vulnerable to both Reflected and Stored XSS (Cross Site Scripting).\u003c/div\u003e\u003cdiv\u003e\u003cbr\u003e\u003c/div\u003e\\nSeveral inputs were not persisted at the backend of Eclipse Ditto, but only in local browser storage to save settings of \\\"environments\\\" of the UI and e.g. the last performed \\\"search queries\\\", resulting in a \\\"Reflected XSS\\\" vulnerability.\u003cbr\u003e\u003cdiv\u003e\u003cbr\u003e\\n\u003c/div\u003e\u003cdiv\u003eHowever, several other inputs were persisted at the backend of Eclipse Ditto, leading to a \\\"Stored XSS\\\" vulnerability. Those mean that authenticated and authorized users at Eclipse Ditto can persist Things in Ditto which can - when being displayed by other users also being authorized to see those Things in the Eclipse Ditto UI - cause scripts to be executed in the browser of other users.\u003c/div\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-79\", \"description\": \"CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"e51fbebd-6053-4e49-959f-1b94eeb69a2c\", \"shortName\": \"eclipse\", \"dateUpdated\": \"2024-05-23T09:56:31.696Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-5165\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-01T21:03:11.075Z\", \"dateReserved\": \"2024-05-21T09:41:41.448Z\", \"assignerOrgId\": \"e51fbebd-6053-4e49-959f-1b94eeb69a2c\", \"datePublished\": \"2024-05-23T09:56:31.696Z\", \"assignerShortName\": \"eclipse\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…