CVE-2024-8572

A vulnerability was found in Gouniverse GoLang CMS 1.4.0. It has been declared as problematic. This vulnerability affects the function PageRenderHtmlByAlias of the file FrontendHandler.go. The manipulation of the argument alias leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.4.1 is able to address this issue. The patch is identified as 3e661cdfb4beeb9fe2ad507cdb8104c0b17d072c. It is recommended to upgrade the affected component.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gouniverse:golang_cms:*:*:*:*:*:*:*:*

History

11 Sep 2024, 15:59

Type Values Removed Values Added
References () https://github.com/gouniverse/cms/commit/3e661cdfb4beeb9fe2ad507cdb8104c0b17d072c - () https://github.com/gouniverse/cms/commit/3e661cdfb4beeb9fe2ad507cdb8104c0b17d072c - Patch
References () https://github.com/gouniverse/cms/issues/5 - () https://github.com/gouniverse/cms/issues/5 - Issue Tracking
References () https://github.com/gouniverse/cms/issues/5#issuecomment-2330848731 - () https://github.com/gouniverse/cms/issues/5#issuecomment-2330848731 - Issue Tracking
References () https://github.com/gouniverse/cms/releases/tag/v1.4.1 - () https://github.com/gouniverse/cms/releases/tag/v1.4.1 - Release Notes
References () https://vuldb.com/?ctiid.276802 - () https://vuldb.com/?ctiid.276802 - Permissions Required
References () https://vuldb.com/?id.276802 - () https://vuldb.com/?id.276802 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.401896 - () https://vuldb.com/?submit.401896 - Third Party Advisory, VDB Entry
CPE cpe:2.3:a:gouniverse:golang_cms:*:*:*:*:*:*:*:*
First Time Gouniverse golang Cms
Gouniverse
CVSS v2 : 4.0
v3 : 3.5
v2 : 4.0
v3 : 6.1

09 Sep 2024, 13:03

Type Values Removed Values Added
Summary
  • (es) Se ha detectado una vulnerabilidad en Gouniverse GoLang CMS 1.4.0. Se ha declarado como problemática. Esta vulnerabilidad afecta a la función PageRenderHtmlByAlias del archivo FrontendHandler.go. La manipulación del argumento alias provoca cross site scripting. El ataque se puede iniciar de forma remota. La actualización a la versión 1.4.1 puede solucionar este problema. El parche se identifica como 3e661cdfb4beeb9fe2ad507cdb8104c0b17d072c. Se recomienda actualizar el componente afectado.

08 Sep 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-08 08:15

Updated : 2024-09-11 15:59


NVD link : CVE-2024-8572

Mitre link : CVE-2024-8572

CVE.ORG link : CVE-2024-8572


JSON object : View

Products Affected

gouniverse

  • golang_cms
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')