{"containers":{"cna":{"affected":[{"product":"galette","vendor":"galette","versions":[{"status":"affected","version":"< 0.9.5"}]}],"descriptions":[{"lang":"en","value":"Galette is a membership management web application geared towards non profit organizations. In versions prior to 0.9.5, malicious javascript code can be stored to be displayed later on self subscription page. The self subscription feature can be disabled as a workaround (this is the default state). Malicious javascript code can be executed (not stored) on login and retrieve password pages. This issue is patched in version 0.9.5."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.8,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-79","description":"CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2021-10-25T16:00:19.000Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://github.com/galette/galette/security/advisories/GHSA-vjc9-mj44-x59q"},{"tags":["x_refsource_MISC"],"url":"https://github.com/galette/galette/commit/514418da973ae5b84bf97f94bd288a41e8e3f0a6"},{"tags":["x_refsource_MISC"],"url":"https://github.com/galette/galette/commit/8f3bdd9f7d0708466e011253064a867ca2b271a5"},{"tags":["x_refsource_MISC"],"url":"https://github.com/galette/galette/commit/f54b2570615d38d0302e937079233e52c2d80995"},{"tags":["x_refsource_MISC"],"url":"https://bugs.galette.eu/issues/1535"}],"source":{"advisory":"GHSA-vjc9-mj44-x59q","discovery":"UNKNOWN"},"title":"Several stored XSS","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2021-21319","STATE":"PUBLIC","TITLE":"Several stored XSS"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"galette","version":{"version_data":[{"version_value":"< 0.9.5"}]}}]},"vendor_name":"galette"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Galette is a membership management web application geared towards non profit organizations. In versions prior to 0.9.5, malicious javascript code can be stored to be displayed later on self subscription page. The self subscription feature can be disabled as a workaround (this is the default state). Malicious javascript code can be executed (not stored) on login and retrieve password pages. This issue is patched in version 0.9.5."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.8,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"}]}]},"references":{"reference_data":[{"name":"https://github.com/galette/galette/security/advisories/GHSA-vjc9-mj44-x59q","refsource":"CONFIRM","url":"https://github.com/galette/galette/security/advisories/GHSA-vjc9-mj44-x59q"},{"name":"https://github.com/galette/galette/commit/514418da973ae5b84bf97f94bd288a41e8e3f0a6","refsource":"MISC","url":"https://github.com/galette/galette/commit/514418da973ae5b84bf97f94bd288a41e8e3f0a6"},{"name":"https://github.com/galette/galette/commit/8f3bdd9f7d0708466e011253064a867ca2b271a5","refsource":"MISC","url":"https://github.com/galette/galette/commit/8f3bdd9f7d0708466e011253064a867ca2b271a5"},{"name":"https://github.com/galette/galette/commit/f54b2570615d38d0302e937079233e52c2d80995","refsource":"MISC","url":"https://github.com/galette/galette/commit/f54b2570615d38d0302e937079233e52c2d80995"},{"name":"https://bugs.galette.eu/issues/1535","refsource":"MISC","url":"https://bugs.galette.eu/issues/1535"}]},"source":{"advisory":"GHSA-vjc9-mj44-x59q","discovery":"UNKNOWN"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T18:09:15.156Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/galette/galette/security/advisories/GHSA-vjc9-mj44-x59q"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/galette/galette/commit/514418da973ae5b84bf97f94bd288a41e8e3f0a6"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/galette/galette/commit/8f3bdd9f7d0708466e011253064a867ca2b271a5"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/galette/galette/commit/f54b2570615d38d0302e937079233e52c2d80995"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://bugs.galette.eu/issues/1535"}]}]},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2021-21319","datePublished":"2021-10-25T16:00:19.000Z","dateReserved":"2020-12-22T00:00:00.000Z","dateUpdated":"2024-08-03T18:09:15.156Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}