CVE-2022-2514

The time and filter parameters in Fava prior to v1.22 are vulnerable to reflected XSS due to the lack of escaping of error messages which contained the parameters in verbatim.
Configurations

Configuration 1 (hide)

cpe:2.3:a:fava_project:fava:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:01

Type Values Removed Values Added
References () https://github.com/beancount/fava/commit/ca9e3882c7b5fbf5273ba52340b9fea6a99f3711 - Patch, Third Party Advisory () https://github.com/beancount/fava/commit/ca9e3882c7b5fbf5273ba52340b9fea6a99f3711 - Patch, Third Party Advisory
References () https://huntr.dev/bounties/dbf77139-4384-4dc5-9994-45a5e0747429 - Exploit, Patch, Third Party Advisory () https://huntr.dev/bounties/dbf77139-4384-4dc5-9994-45a5e0747429 - Exploit, Patch, Third Party Advisory

27 Jul 2022, 19:29

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
References (MISC) https://github.com/beancount/fava/commit/ca9e3882c7b5fbf5273ba52340b9fea6a99f3711 - (MISC) https://github.com/beancount/fava/commit/ca9e3882c7b5fbf5273ba52340b9fea6a99f3711 - Patch, Third Party Advisory
References (CONFIRM) https://huntr.dev/bounties/dbf77139-4384-4dc5-9994-45a5e0747429 - (CONFIRM) https://huntr.dev/bounties/dbf77139-4384-4dc5-9994-45a5e0747429 - Exploit, Patch, Third Party Advisory
CPE cpe:2.3:a:fava_project:fava:*:*:*:*:*:*:*:*

25 Jul 2022, 14:51

Type Values Removed Values Added
New CVE

Information

Published : 2022-07-25 14:15

Updated : 2024-11-21 07:01


NVD link : CVE-2022-2514

Mitre link : CVE-2022-2514

CVE.ORG link : CVE-2022-2514


JSON object : View

Products Affected

fava_project

  • fava
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')