CVE-2024-3938

The "reset password" login page accepted an HTML injection via URL parameters.

This has already been rectified via patch, and as such it cannot be demonstrated via Demo site link. Those interested to see the vulnerability may spin up a  http://localhost:8082/dotAdmin/#/public/login?resetEmailSent=true&resetEmail=%3Ch1%3E%3Ca%20href%3D%22https:%2F%2Fgoogle.com%22%3ECLICK%20ME%3C%2Fa%3E%3C%2Fh1%3E 

This will result in a view along these lines:





  *  OWASP Top 10 - A03: Injection
  *  CVSS Score: 5.4
  *   AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator 
  *   https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N&... https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator
Cross-site Scripting
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.4 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
dotCMSCNA
5.4 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
CISA-ADPADP
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 42%
VendorProductVersion
dotcmsdotcms
5.1.5 ≤
𝑥
< 23.01.18
dotcmsdotcms
23.02 ≤
𝑥
≤ 23.09.7
dotcmsdotcms
23.12.21 ≤
𝑥
≤ 24.04.23
dotcmsdotcms
24.05.13 ≤
𝑥
< 24.05.31
dotcmsdotcms
23.10.24:1
dotcmsdotcms
23.10.24:10
dotcmsdotcms
23.10.24:2
dotcmsdotcms
23.10.24:3
dotcmsdotcms
23.10.24:4
dotcmsdotcms
23.10.24:5
dotcmsdotcms
23.10.24:6
dotcmsdotcms
23.10.24:7
dotcmsdotcms
23.10.24:8
dotcmsdotcms
23.10.24:9
dotcmsdotcms
23.10.24.0
dotcmsdotcms
24.04.24
dotcmsdotcms
24.04.24:0
dotcmsdotcms
24.04.24:1
dotcmsdotcms
24.04.24:2
dotcmsdotcms
24.04.24:3
𝑥
= Vulnerable software versions