JStachio is a type-safe Java Mustache templating engine. Prior to version 1.0.1, JStachio fails to escape single quotes `'` in HTML, allowing an attacker to inject malicious code. This vulnerability can be exploited by an attacker to execute arbitrary JavaScript code in the context of other users visiting pages that use this template engine. This can lead to various consequences, including session hijacking, defacement of web pages, theft of sensitive information, or even the propagation of malware.
Version 1.0.1 contains a patch for this issue. To mitigate this vulnerability, the template engine should properly escape special characters, including single quotes. Common practice is to escape `'` as `'`. As a workaround, users can avoid this issue by using only double quotes `"` for HTML attributes.
References
Link | Resource |
---|---|
https://github.com/jstachio/jstachio/commit/7b2f78377d1284df14c580be762a25af5f8dcd66 | Patch |
https://github.com/jstachio/jstachio/issues/157 | Issue Tracking Patch |
https://github.com/jstachio/jstachio/pull/158 | Patch |
https://github.com/jstachio/jstachio/releases/tag/v1.0.1 | Release Notes |
https://github.com/jstachio/jstachio/security/advisories/GHSA-gwxv-jv83-6qjr | Exploit Vendor Advisory |
https://github.com/jstachio/jstachio/commit/7b2f78377d1284df14c580be762a25af5f8dcd66 | Patch |
https://github.com/jstachio/jstachio/issues/157 | Issue Tracking Patch |
https://github.com/jstachio/jstachio/pull/158 | Patch |
https://github.com/jstachio/jstachio/releases/tag/v1.0.1 | Release Notes |
https://github.com/jstachio/jstachio/security/advisories/GHSA-gwxv-jv83-6qjr | Exploit Vendor Advisory |
Configurations
History
21 Nov 2024, 08:06
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
References | () https://github.com/jstachio/jstachio/commit/7b2f78377d1284df14c580be762a25af5f8dcd66 - Patch | |
References | () https://github.com/jstachio/jstachio/issues/157 - Issue Tracking, Patch | |
References | () https://github.com/jstachio/jstachio/pull/158 - Patch | |
References | () https://github.com/jstachio/jstachio/releases/tag/v1.0.1 - Release Notes | |
References | () https://github.com/jstachio/jstachio/security/advisories/GHSA-gwxv-jv83-6qjr - Exploit, Vendor Advisory |
06 Jun 2023, 20:53
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:jstachio_project:jstachio:*:*:*:*:*:*:*:* | |
References | (MISC) https://github.com/jstachio/jstachio/security/advisories/GHSA-gwxv-jv83-6qjr - Exploit, Vendor Advisory | |
References | (MISC) https://github.com/jstachio/jstachio/issues/157 - Issue Tracking, Patch | |
References | (MISC) https://github.com/jstachio/jstachio/commit/7b2f78377d1284df14c580be762a25af5f8dcd66 - Patch | |
References | (MISC) https://github.com/jstachio/jstachio/pull/158 - Patch | |
References | (MISC) https://github.com/jstachio/jstachio/releases/tag/v1.0.1 - Release Notes | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
CWE | CWE-79 |
30 May 2023, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-05-30 22:15
Updated : 2024-11-21 08:06
NVD link : CVE-2023-33962
Mitre link : CVE-2023-33962
CVE.ORG link : CVE-2023-33962
JSON object : View
Products Affected
jstachio_project
- jstachio
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')