Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2019-12562 (Medium) detected in dotnetnuke.core.9.2.1.533.nupkg #8

Open
mend-bolt-for-github bot opened this issue Sep 30, 2021 · 0 comments
Labels
Mend: dependency security vulnerability Security vulnerability detected by WhiteSource

Comments

@mend-bolt-for-github
Copy link
Contributor

mend-bolt-for-github bot commented Sep 30, 2021

CVE-2019-12562 - Medium Severity Vulnerability

Vulnerable Library - dotnetnuke.core.9.2.1.533.nupkg

DNN Platform is an open source web application framework. This package contains only the core DNN Platform library.

Library home page: https://api.nuget.org/packages/dotnetnuke.core.9.2.1.533.nupkg

Path to dependency file: /Modules/CloudFlareClearCache/Upendo.Modules.CloudFlareClearCache.csproj

Path to vulnerable library: /s/dotnetnuke.core/9.2.1.533/dotnetnuke.core.9.2.1.533.nupkg

Dependency Hierarchy:

  • dotnetnuke.core.9.2.1.533.nupkg (Vulnerable Library)

Found in HEAD commit: e5ad080d6b4d66b3ca83faca2fd564a84b344f31

Found in base branch: master

Vulnerability Details

Stored Cross-Site Scripting in DotNetNuke (DNN) Version before 9.4.0 allows remote attackers to store and embed the malicious script into the admin notification page. The exploit could be used to perfom any action with admin privileges such as managing content, adding users, uploading backdoors to the server, etc. Successful exploitation occurs when an admin user visits a notification page with stored cross-site scripting.

Publish Date: 2019-09-26

URL: CVE-2019-12562

CVSS 3 Score Details (6.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12562

Release Date: 2019-09-26

Fix Resolution: 9.4.0


Step up your Open Source Security Game with Mend here

@mend-bolt-for-github mend-bolt-for-github bot added the Mend: dependency security vulnerability Security vulnerability detected by WhiteSource label Sep 30, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Mend: dependency security vulnerability Security vulnerability detected by WhiteSource
Projects
None yet
Development

No branches or pull requests

0 participants