Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Malicious Javascript injection in OriginProtocol/origin-website
Vulnerability Description
Origin Protocol is a blockchain based project. The Origin Protocol project website allows for malicious users to inject malicious Javascript via a POST request to `/presale/join`. User-controlled data is passed with no sanitization to SendGrid and injected into an email that is delivered to the founders@originprotocol.com. If the email recipient is using an email program that is susceptible to XSS, then that email recipient will receive an email that may contain malicious XSS. Regardless if the email recipient’s mail program has vulnerabilities or not, the hacker can at the very least inject malicious HTML that modifies the body content of the email. There are currently no known workarounds.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Vulnerability Title
Origin Protocol 跨站脚本漏洞
Vulnerability Description
Origin Protocol是美国Origin公司的一个基于以太坊的平台,旨在将不可替代的代币 (NFT) 和去中心化金融 (DeFi) 带给大众。 Origin Protocol 存在安全漏洞,该漏洞允许攻击者通过 POST 请求向 /presale/join 注入恶意 Javascript 代码。
CVSS Information
N/A
Vulnerability Type
N/A