Sencha Ext JS におけるクロスサイトスクリプティングの脆弱性
| Title |
Sencha Ext JS におけるクロスサイトスクリプティングの脆弱性
|
| Summary |
Sencha Ext JS には、クロスサイトスクリプティングの脆弱性が存在します。
|
| Possible impacts |
情報を取得される、および情報を改ざんされる可能性があります。 |
| Solution |
ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date |
June 14, 2018, midnight |
| Registration Date |
Sept. 21, 2018, 4:04 p.m. |
| Last Update |
Sept. 21, 2018, 4:04 p.m. |
|
CVSS3.0 : 警告
|
| Score |
6.1
|
| Vector |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
|
CVSS2.0 : 警告
|
| Score |
4.3
|
| Vector |
AV:N/AC:M/Au:N/C:N/I:P/A:N |
Affected System
| Sencha |
|
Ext JS 4 から 6.6.0 未満の 6
|
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
| No |
Changed Details |
Date of change |
| 1 |
[2018年09月21日] 掲載 |
Sept. 21, 2018, 4:04 p.m. |
NVD Vulnerability Information
CVE-2018-8046
| Summary |
The getTip() method of Action Columns of Sencha Ext JS 4 to 6 before 6.6.0 is vulnerable to XSS attacks, even when passed HTML-escaped data. This framework brings no built-in XSS protection, so the developer has to ensure that data is correctly sanitized. However, the getTip() method of Action Columns takes HTML-escaped data and un-escapes it. If the tooltip contains user-controlled data, an attacker could exploit this to create a cross-site scripting attack, even when developers took precautions and escaped data.
|
| Publication Date |
July 6, 2018, 5:29 a.m. |
| Registration Date |
March 1, 2021, 7:40 p.m. |
| Last Update |
Nov. 21, 2024, 1:13 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:sencha:ext_js:*:*:*:*:*:*:*:* |
4.0.0 |
|
|
6.6.0 |
Related information, measures and tools
Common Vulnerabilities List