CVE-2024-3938

EUVD-2024-32505
The "reset password" login page accepted an HTML injection via URL parameters.

This has already been rectified via patch, and as such it cannot be demonstrated via Demo site link. Those interested to see the vulnerability may spin up a  http://localhost:8082/dotAdmin/#/public/login?resetEmailSent=true&resetEmail=%3Ch1%3E%3Ca%20href%3D%22https:%2F%2Fgoogle.com%22%3ECLICK%20ME%3C%2Fa%3E%3C%2Fh1%3E 

This will result in a view along these lines:





  *  OWASP Top 10 - A03: Injection
  *  CVSS Score: 5.4
  *   AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator 
  *   https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N&... https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator
Cross-site Scripting
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.4 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
dotCMSCNA
5.4 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 71%
Affected Products (NVD)
VendorProductVersion
dotcmsdotcms
5.1.5 ≤
𝑥
< 23.01.18
dotcmsdotcms
23.02 ≤
𝑥
≤ 23.09.7
dotcmsdotcms
23.12.21 ≤
𝑥
≤ 24.04.23
dotcmsdotcms
24.05.13 ≤
𝑥
< 24.05.31
dotcmsdotcms
23.10.24:1
dotcmsdotcms
23.10.24:10
dotcmsdotcms
23.10.24:2
dotcmsdotcms
23.10.24:3
dotcmsdotcms
23.10.24:4
dotcmsdotcms
23.10.24:5
dotcmsdotcms
23.10.24:6
dotcmsdotcms
23.10.24:7
dotcmsdotcms
23.10.24:8
dotcmsdotcms
23.10.24:9
dotcmsdotcms
23.10.24.0
dotcmsdotcms
24.04.24
dotcmsdotcms
24.04.24:0
dotcmsdotcms
24.04.24:1
dotcmsdotcms
24.04.24:2
dotcmsdotcms
24.04.24:3
𝑥
= Vulnerable software versions