Published:2019/03/05 Last Updated:2019/03/12
JVN#40288903
Dradis Community Edition and Dradis Professional Edition vulnerable to cross-site scripting
Overview
Dradis Community Edition and Dradis Professional Edition contain a cross-site scripting vulnerability.
Products Affected
- Dradis Community Edition v3.11 and earlier
- Dradis Professional Edition v3.1.1 and earlier
Description
Dradis Community Edition and Dradis Professional Edition provided by Security Roots Ltd contain a cross-site scripting vulnerability (CWE-79).
Impact
An arbitrary script may be executed on the user's web browser.
Solution
Update the Software
Apply the latest version of software according to the information provided by the developer.
Vendor Status
Vendor | Status | Last Update | Vendor Notes |
---|---|---|---|
Security Roots Ltd | Vulnerable | 2019/03/05 | Security Roots Ltd website |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
CVSS v3
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Base Score:
5.4
Attack Vector(AV) | Physical (P) | Local (L) | Adjacent (A) | Network (N) |
---|---|---|---|---|
Attack Complexity(AC) | High (H) | Low (L) | ||
Privileges Required(PR) | High (H) | Low (L) | None (N) | |
User Interaction(UI) | Required (R) | None (N) | ||
Scope(S) | Unchanged (U) | Changed (C) | ||
Confidentiality Impact(C) | None (N) | Low (L) | High (H) | |
Integrity Impact(I) | None (N) | Low (L) | High (H) | |
Availability Impact(A) | None (N) | Low (L) | High (H) |
CVSS v2
AV:N/AC:L/Au:S/C:N/I:P/A:N
Base Score:
4.0
Access Vector(AV) | Local (L) | Adjacent Network (A) | Network (N) |
---|---|---|---|
Access Complexity(AC) | High (H) | Medium (M) | Low (L) |
Authentication(Au) | Multiple (M) | Single (S) | None (N) |
Confidentiality Impact(C) | None (N) | Partial (P) | Complete (C) |
Integrity Impact(I) | None (N) | Partial (P) | Complete (C) |
Availability Impact(A) | None (N) | Partial (P) | Complete (C) |
Credit
Ohji Kashiwazaki of Ierae Security, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information
JPCERT Alert | |
JPCERT Reports | |
CERT Advisory | |
CPNI Advisory | |
TRnotes | |
CVE |
CVE-2019-5925 |
JVN iPedia |
JVNDB-2019-000017 |
Update History
- 2019/03/12
- Fixed "Products Affected"