CVE-2022-24864

Origin Protocol is a blockchain based project. The Origin Protocol project website allows for malicious users to inject malicious Javascript via a POST request to `/presale/join`. User-controlled data is passed with no sanitization to SendGrid and injected into an email that is delivered to the founders@originprotocol.com. If the email recipient is using an email program that is susceptible to XSS, then that email recipient will receive an email that may contain malicious XSS. Regardless if the email recipient’s mail program has vulnerabilities or not, the hacker can at the very least inject malicious HTML that modifies the body content of the email. There are currently no known workarounds.
Configurations

Configuration 1 (hide)

cpe:2.3:a:originprotocol:origin_website:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:51

Type Values Removed Values Added
References () https://github.com/OriginProtocol/origin-website/pull/617 - Patch, Third Party Advisory () https://github.com/OriginProtocol/origin-website/pull/617 - Patch, Third Party Advisory
References () https://github.com/OriginProtocol/origin-website/security/advisories/GHSA-v6fc-qwxx-m4h7 - Third Party Advisory () https://github.com/OriginProtocol/origin-website/security/advisories/GHSA-v6fc-qwxx-m4h7 - Third Party Advisory
References () https://github.com/github/codeql/pull/7127 - Patch, Third Party Advisory () https://github.com/github/codeql/pull/7127 - Patch, Third Party Advisory
CVSS v2 : 3.5
v3 : 5.4
v2 : 3.5
v3 : 4.1

28 Apr 2022, 16:41

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 3.5
v3 : 5.4
CWE CWE-79
CPE cpe:2.3:a:originprotocol:origin_website:*:*:*:*:*:*:*:*
References (CONFIRM) https://github.com/OriginProtocol/origin-website/security/advisories/GHSA-v6fc-qwxx-m4h7 - (CONFIRM) https://github.com/OriginProtocol/origin-website/security/advisories/GHSA-v6fc-qwxx-m4h7 - Third Party Advisory
References (MISC) https://github.com/OriginProtocol/origin-website/pull/617 - (MISC) https://github.com/OriginProtocol/origin-website/pull/617 - Patch, Third Party Advisory
References (MISC) https://github.com/github/codeql/pull/7127 - (MISC) https://github.com/github/codeql/pull/7127 - Patch, Third Party Advisory

20 Apr 2022, 19:20

Type Values Removed Values Added
New CVE

Information

Published : 2022-04-20 19:15

Updated : 2024-11-21 06:51


NVD link : CVE-2022-24864

Mitre link : CVE-2022-24864

CVE.ORG link : CVE-2022-24864


JSON object : View

Products Affected

originprotocol

  • origin_website
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')