This affects the package vis-timeline before 7.4.4. An attacker with the ability to control the items of a Timeline element can inject additional script code into the generated application.
References
Link | Resource |
---|---|
https://github.com/visjs/vis-timeline/issues/838 | Issue Tracking Third Party Advisory |
https://github.com/visjs/vis-timeline/pull/840 | Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBVISJS-1063502 | Exploit Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1063501 | Exploit Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-JS-VISTIMELINE-1063500 | Exploit Patch Third Party Advisory |
https://github.com/visjs/vis-timeline/issues/838 | Issue Tracking Third Party Advisory |
https://github.com/visjs/vis-timeline/pull/840 | Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBVISJS-1063502 | Exploit Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1063501 | Exploit Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-JS-VISTIMELINE-1063500 | Exploit Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 05:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/visjs/vis-timeline/issues/838 - Issue Tracking, Third Party Advisory | |
References | () https://github.com/visjs/vis-timeline/pull/840 - Patch, Third Party Advisory | |
References | () https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBVISJS-1063502 - Exploit, Patch, Third Party Advisory | |
References | () https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1063501 - Exploit, Patch, Third Party Advisory | |
References | () https://snyk.io/vuln/SNYK-JS-VISTIMELINE-1063500 - Exploit, Patch, Third Party Advisory |
Information
Published : 2021-01-22 18:15
Updated : 2024-11-21 05:22
NVD link : CVE-2020-28487
Mitre link : CVE-2020-28487
CVE.ORG link : CVE-2020-28487
JSON object : View
Products Affected
visjs
- vis-timeline
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')