XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x before 41.1 when View Source mode or Reader mode is used, as demonstrated by a a page title.
References
| Link | Resource |
|---|---|
| https://gitlab.gnome.org/GNOME/epiphany/-/issues/1612 | Exploit Vendor Advisory |
| https://gitlab.gnome.org/GNOME/epiphany/-/merge_requests/1045 | Patch Vendor Advisory |
| https://lists.debian.org/debian-lts-announce/2022/08/msg00006.html | Mailing List Third Party Advisory |
| https://www.debian.org/security/2022/dsa-5042 | Third Party Advisory |
| https://gitlab.gnome.org/GNOME/epiphany/-/issues/1612 | Exploit Vendor Advisory |
| https://gitlab.gnome.org/GNOME/epiphany/-/merge_requests/1045 | Patch Vendor Advisory |
| https://lists.debian.org/debian-lts-announce/2022/08/msg00006.html | Mailing List Third Party Advisory |
| https://www.debian.org/security/2022/dsa-5042 | Third Party Advisory |
Configurations
History
21 Nov 2024, 06:31
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://gitlab.gnome.org/GNOME/epiphany/-/issues/1612 - Exploit, Vendor Advisory | |
| References | () https://gitlab.gnome.org/GNOME/epiphany/-/merge_requests/1045 - Patch, Vendor Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2022/08/msg00006.html - Mailing List, Third Party Advisory | |
| References | () https://www.debian.org/security/2022/dsa-5042 - Third Party Advisory |
19 Aug 2022, 09:57
| Type | Values Removed | Values Added |
|---|---|---|
| References | (MLIST) https://lists.debian.org/debian-lts-announce/2022/08/msg00006.html - Mailing List, Third Party Advisory | |
| CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
18 Aug 2022, 10:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Jan 2022, 14:47
| Type | Values Removed | Values Added |
|---|---|---|
| References | (DEBIAN) https://www.debian.org/security/2022/dsa-5042 - Third Party Advisory | |
| CPE | cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
13 Jan 2022, 11:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
17 Dec 2021, 20:24
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 6.1 |
| CPE | cpe:2.3:a:gnome:epiphany:*:*:*:*:*:*:*:* | |
| CWE | CWE-79 | |
| References | (MISC) https://gitlab.gnome.org/GNOME/epiphany/-/issues/1612 - Exploit, Vendor Advisory | |
| References | (MISC) https://gitlab.gnome.org/GNOME/epiphany/-/merge_requests/1045 - Patch, Vendor Advisory |
16 Dec 2021, 03:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2021-12-16 03:15
Updated : 2024-11-21 06:31
NVD link : CVE-2021-45087
Mitre link : CVE-2021-45087
CVE.ORG link : CVE-2021-45087
JSON object : View
Products Affected
debian
- debian_linux
gnome
- epiphany
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
