Vulnerability Name: | CVE-2022-1231 (CCN-224682) | ||||||||||||
Assigned: | 2022-04-03 | ||||||||||||
Published: | 2022-04-03 | ||||||||||||
Updated: | 2022-05-13 | ||||||||||||
Summary: | XSS via Embedded SVG in SVG Diagram Format in GitHub repository plantuml/plantuml prior to 1.2022.4. Stored XSS in the context of the diagram embedder. Depending on the actual context, this ranges from stealing secrets to account hijacking or even to code execution for example in desktop applications. Web based applications are the ones most affected. Since the SVG format allows clickable links in diagrams, it is commonly used in plugins for web based projects (like the Confluence plugin, etc. see https://plantuml.com/de/running). | ||||||||||||
CVSS v3 Severity: | 6.1 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) 5.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:H/RL:O/RC:C)
8.9 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N/E:H/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
| ||||||||||||
Vulnerability Type: | CWE-79 CWE-79 | ||||||||||||
Vulnerability Consequences: | Cross-Site Scripting | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-1231 Source: XF Type: UNKNOWN plantuml-cve20221231-xss(224682) Source: CCN Type: PlantUML GIT Repository plantuml Source: MISC Type: Patch, Third Party Advisory https://github.com/plantuml/plantuml/commit/c9137be051ce98b3e3e27f65f54ec7d9f8886903 Source: CONFIRM Type: Exploit, Third Party Advisory https://huntr.dev/bounties/27db9509-6cd3-4148-8d70-5942f3837604 Source: CCN Type: huntr Web site XSS via Embedded SVG in SVG Diagram Format in plantuml/plantuml Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2022-930b54aa84 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2022-e8b1324ec8 Source: CCN Type: PlantUML Web site PlantUML | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: ![]() | ||||||||||||
BACK |