漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
CUBA Generic REST API Vulnerable to Cross-Site Scripting (XSS) in the /files Endpoint
Vulnerability Description
The CUBA REST API add-on performs operations on data and entities. Prior to version 7.2.7, the input parameter, which consists of a file path and name, can be manipulated to return the Content-Type header with text/html if the name part ends with .html. This could allow malicious JavaScript code to be executed in the browser. For a successful attack, a malicious file needs to be uploaded beforehand. This issue has been patched in version 7.2.7. A workaround is provided on the Jmix documentation website.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Vulnerability Title
CUBA REST API Add-on 跨站脚本漏洞
Vulnerability Description
CUBA REST API Add-on是CUBA Platform开源的一个通用的 REST API。 CUBA REST API Add-on 7.2.7之前版本存在跨站脚本漏洞,该漏洞源于文件路径操作不当,可能导致恶意JavaScript执行。
CVSS Information
N/A
Vulnerability Type
N/A