Executive Summary

Informations
Name CVE-2024-38527 First vendor Publication 2024-06-26
Vendor Cve Last vendor Modification 2024-06-27

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

ZenUML is JavaScript-based diagramming tool that requires no server, using Markdown-inspired text definitions and a renderer to create and modify sequence diagrams. Markdown-based comments in the ZenUML diagram syntax are susceptible to Cross-site Scripting (XSS). The comment feature allows the user to attach small notes for reference. This feature allows the user to enter in their comment in markdown comment, allowing them to use common markdown features, such as `**` for bolded text. However, the markdown text is currently not sanitized before rendering, allowing an attacker to enter a malicious payload for the comment which leads to XSS. This puts existing applications that use ZenUML unsandboxed at risk of arbitrary JavaScript execution when rendering user-controlled diagrams. This vulnerability was patched in version 3.23.25,

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38527

Sources (Detail)

https://github.com/mermaid-js/zenuml-core/commit/ad7545b33f5f27466cbf357beb65...
https://github.com/mermaid-js/zenuml-core/security/advisories/GHSA-q6xv-jm4v-...
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2024-06-27 17:27:24
  • Multiple Updates
2024-06-27 00:27:24
  • First insertion