Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS12bXE5LWNtN20tNHA4cM4AAU4e

Improper Neutralization of Input During Web Page Generation in Dojo Dojo Objective Harness

Dojo Dojo Objective Harness (DOH) version prior to version 1.14 contains a Cross Site Scripting (XSS) vulnerability in unit.html and testsDOH/_base/loader/i18n-exhaustive/i18n-test/unit.html and testsDOH/_base/i18nExhaustive.js in the DOH that can result in Victim attacked through their browser - deliver malware, steal HTTP cookies, bypass CORS trust. This attack appear to be exploitable via Victims are typically lured to a web site under the attacker's control; the XSS vulnerability on the target domain is silently exploited without the victim's knowledge. This vulnerability appears to have been fixed in 1.14.

Permalink: https://github.com/advisories/GHSA-vmq9-cm7m-4p8p
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS12bXE5LWNtN20tNHA4cM4AAU4e
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 2 years ago
Updated: about 1 year ago


CVSS Score: 6.1
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Identifiers: GHSA-vmq9-cm7m-4p8p, CVE-2018-1000665
References: Repository: https://github.com/dojo/dojo
Blast Radius: 8.3

Affected Packages

maven:org.dojotoolkit:dojo
Dependent packages: 8
Dependent repositories: 23
Downloads:
Affected Version Ranges: < 1.14
Fixed in: 1.14
All affected versions: 1.3.3, 1.4.8, 1.5.6, 1.6.5, 1.7.12, 1.8.14, 1.9.11, 1.10.8, 1.11.1, 1.11.2, 1.11.3, 1.11.4, 1.12.1, 1.12.2, 1.12.3, 1.13.0, 1.13.1
All unaffected versions: 1.14.0, 1.14.1, 1.14.2, 1.14.3, 1.15.0, 1.15.1, 1.16.0, 1.16.1, 1.16.2, 1.16.3, 1.16.4, 1.16.5, 1.17.0, 1.17.1, 1.17.2, 1.17.3