Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1jZjVyLTNwdm0tdzY0d84AAwvW

typo3-appointments vulnerable to Cross-site Scripting

A vulnerability, which was classified as problematic, was found in innologi appointments Extension up to 2.0.5. This affects an unknown part of the component Appointment Handler. The manipulation of the argument formfield leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 2.0.6 is able to address this issue. The name of the patch is 986d3cb34e5e086c6f04e061f600ffc5837abe7f. It is recommended to upgrade the affected component. The identifier VDB-217353 was assigned to this vulnerability.

Permalink: https://github.com/advisories/GHSA-cf5r-3pvm-w64w
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1jZjVyLTNwdm0tdzY0d84AAwvW
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 1 year ago
Updated: 6 months ago


CVSS Score: 6.1
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Identifiers: GHSA-cf5r-3pvm-w64w, CVE-2019-25094
References: Repository: https://github.com/innologi/typo3-appointments
Blast Radius: 1.0

Affected Packages

packagist:innologi/typo3-appointments
Dependent packages: 0
Dependent repositories: 0
Downloads: 1,832 total
Affected Version Ranges: < 2.0.6
Fixed in: 2.0.6
All affected versions: 2.0.0, 2.0.1, 2.0.2, 2.0.4, 2.0.5
All unaffected versions: 2.0.6, 2.0.7, 2.1.0, 2.1.1, 2.1.2, 2.1.3, 3.0.0, 3.0.1, 3.0.2, 3.0.3, 3.0.4, 3.0.5, 3.0.6, 3.1.0, 3.1.1, 3.1.2, 3.1.3, 3.2.0