Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
CUBA Generic REST API Vulnerable to Cross-Site Scripting (XSS) in the /files Endpoint
Vulnerability Description
The CUBA REST API add-on performs operations on data and entities. Prior to version 7.2.7, the input parameter, which consists of a file path and name, can be manipulated to return the Content-Type header with text/html if the name part ends with .html. This could allow malicious JavaScript code to be executed in the browser. For a successful attack, a malicious file needs to be uploaded beforehand. This issue has been patched in version 7.2.7. A workaround is provided on the Jmix documentation website.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Vulnerability Title
CUBA REST API Add-on 跨站脚本漏洞
Vulnerability Description
CUBA REST API Add-on是CUBA Platform开源的一个通用的 REST API。 CUBA REST API Add-on 7.2.7之前版本存在跨站脚本漏洞,该漏洞源于文件路径操作不当,可能导致恶意JavaScript执行。
CVSS Information
N/A
Vulnerability Type
N/A