CVE-2023-29049
moderate-risk
Published 2024-01-08
The "upsell" widget at the portal page could be abused to inject arbitrary script code. Attackers that manage to lure users to a compromised account, or gain temporary access to a legitimate account, could inject script code to gain persistent code execution capabilities under a trusted domain. User input for this widget is now sanitized to avoid malicious content the be processed. No publicly available exploits are known.
Do I need to act?
-
0.22% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.4/10
Medium
NETWORK
/ LOW complexity
Affected Products (20)
Affected Vendors
References (8)
Third Party Advisory
http://packetstormsecurity.com/files/176421/OX-App-Suite-7.10.6-XSS-Command-Exec...
Mailing List
http://seclists.org/fulldisclosure/2024/Jan/3
Third Party Advisory
http://packetstormsecurity.com/files/176421/OX-App-Suite-7.10.6-XSS-Command-Exec...
Mailing List
http://seclists.org/fulldisclosure/2024/Jan/3
45
/ 100
moderate-risk
Severity
21/34 · High
Exploitability
1/34 · Minimal
Exposure
23/34 · High