Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Joget User Profile Menu UserProfileMenu.java submitForm cross site scripting
Vulnerability Description
A vulnerability, which was classified as problematic, has been found in Joget up to 7.0.33. This issue affects the function submitForm of the file wflow-core/src/main/java/org/joget/plugin/enterprise/UserProfileMenu.java of the component User Profile Menu. The manipulation of the argument firstName/lastName leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 7.0.34 is able to address this issue. The patch is named 9a77f508a2bf8cf661d588f37a4cc29ecaea4fc8. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217055.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Vulnerability Title
Joget 跨站脚本漏洞
Vulnerability Description
Joget是Joget开源的一个开源无代码/低代码应用程序平台。用于更快、更简单的数字转换(DX)。 Joget 7.0.34之前版本存在跨站脚本漏洞,该漏洞源于文件wflow-core/src/main/java/org/joget/plugin/enterprise/UserProfileMenu.java的函数submitForm存在问题,对参数firstName/lastName的操作会导致跨站脚本。
CVSS Information
N/A
Vulnerability Type
N/A