{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2019-25095","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-01-05T07:44:14.946Z","datePublished":"2023-01-05T07:44:28.221Z","dateUpdated":"2024-08-05T03:00:19.240Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-20T12:48:18.043Z"},"title":"kakwa LdapCherry URL cross site scripting","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"CWE-79 Cross Site Scripting"}]}],"affected":[{"vendor":"kakwa","product":"LdapCherry","versions":[{"version":"0.x","status":"affected"}],"modules":["URL Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as problematic, was found in kakwa LdapCherry up to 0.x. Affected is an unknown function of the component URL Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.0.0 is able to address this issue. The patch is identified as 6f98076281e9452fdb1adcd1bcbb70a6f968ade9. It is recommended to upgrade the affected component. VDB-217434 is the identifier assigned to this vulnerability."},{"lang":"de","value":"Es wurde eine Schwachstelle in kakwa LdapCherry bis 0.x gefunden. Sie wurde als problematisch eingestuft. Betroffen hiervon ist ein unbekannter Ablauf der Komponente URL Handler. Durch Manipulieren mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Ein Aktualisieren auf die Version 1.0.0 vermag dieses Problem zu lösen. Der Patch wird als 6f98076281e9452fdb1adcd1bcbb70a6f968ade9 bezeichnet. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":3.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.5,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N"}}],"timeline":[{"time":"2023-01-05T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-01-05T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-01-05T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-01-28T13:54:52.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"VulDB GitHub Commit Analyzer","type":"tool"}],"references":[{"url":"https://vuldb.com/?id.217434","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.217434","tags":["signature","permissions-required"]},{"url":"https://github.com/kakwa/ldapcherry/pull/16","tags":["issue-tracking"]},{"url":"https://github.com/kakwa/ldapcherry/commit/6f98076281e9452fdb1adcd1bcbb70a6f968ade9","tags":["patch"]},{"url":"https://github.com/kakwa/ldapcherry/releases/tag/1.0.0","tags":["patch"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T03:00:19.240Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.217434","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.217434","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/kakwa/ldapcherry/pull/16","tags":["issue-tracking","x_transferred"]},{"url":"https://github.com/kakwa/ldapcherry/commit/6f98076281e9452fdb1adcd1bcbb70a6f968ade9","tags":["patch","x_transferred"]},{"url":"https://github.com/kakwa/ldapcherry/releases/tag/1.0.0","tags":["patch","x_transferred"]}]}]}}