Xibo is an open source digital signage platform with a web content management system (CMS). Prior to version 4.1.0, a cross-site scripting vulnerability in Xibo CMS allows authorized users to execute JavaScript via the DataSet functionality. Users can design a DataSet with a HTML column which contains JavaScript, which is intended functionality. The JavaScript gets executed on the Data Entry page and in any Layouts which reference it. This behavior has been changed in 4.1.0 to show HTML/CSS/JS as code on the Data Entry page. There are no workarounds for this issue.
References
Configurations
History
12 Sep 2024, 20:18
Type | Values Removed | Values Added |
---|---|---|
First Time |
Xibosignage xibo
Xibosignage |
|
Summary |
|
|
References | () https://github.com/xibosignage/xibo-cms/commit/009527855d8bfd0ffb95f5c88ed72b7b5bdebfa1 - Patch | |
References | () https://github.com/xibosignage/xibo-cms/security/advisories/GHSA-pfxp-vxh7-2h9f - Vendor Advisory | |
CPE | cpe:2.3:a:xibosignage:xibo:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.8 |
03 Sep 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-03 19:15
Updated : 2024-09-12 20:18
NVD link : CVE-2024-43413
Mitre link : CVE-2024-43413
CVE.ORG link : CVE-2024-43413
JSON object : View
Products Affected
xibosignage
- xibo
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')