A vulnerability classified as problematic has been found in Indeed Engineering util up to 1.0.33. Affected is the function visit/appendTo of the file varexport/src/main/java/com/indeed/util/varexport/servlet/ViewExportedVariablesServlet.java. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.0.34 is able to address this issue. The name of the patch is c0952a9db51a880e9544d9fac2a2218a6bfc9c63. It is recommended to upgrade the affected component. VDB-216882 is the identifier assigned to this vulnerability.
References
Link | Resource |
---|---|
https://github.com/indeedeng/util/commit/c0952a9db51a880e9544d9fac2a2218a6bfc9c63 | Patch Third Party Advisory |
https://github.com/indeedeng/util/releases/tag/published%2F1.0.34 | Release Notes Third Party Advisory |
https://vuldb.com/?ctiid.216882 | Third Party Advisory |
https://vuldb.com/?id.216882 | Third Party Advisory |
Configurations
History
29 Feb 2024, 01:28
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-12-27 13:15
Updated : 2024-05-17 01:48
NVD link : CVE-2020-36634
Mitre link : CVE-2020-36634
CVE.ORG link : CVE-2020-36634
JSON object : View
Products Affected
indeed
- util
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')