{"containers":{"cna":{"affected":[{"product":"Ajax.NET-Professional","vendor":"michaelschwarz","versions":[{"status":"affected","version":"< 21.12.22.1"}]}],"descriptions":[{"lang":"en","value":"Ajax.NET Professional (AjaxPro) is an AJAX framework available for Microsoft ASP.NET. Affected versions of this package are vulnerable to JavaScript object injection which may result in cross site scripting when leveraged by a malicious user. The affected core relates to JavaScript object creation when parsing json input. Releases before version 21.12.22.1 are affected. A workaround exists that replaces one of the core JavaScript files embedded in the library. See the GHSA-5q7q-qqw2-hjq7 for workaround details."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.7,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-79","description":"CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2021-12-22T20:55:09.000Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://github.com/michaelschwarz/Ajax.NET-Professional/security/advisories/GHSA-5q7q-qqw2-hjq7"},{"tags":["x_refsource_MISC"],"url":"https://github.com/michaelschwarz/Ajax.NET-Professional/commit/c89e39b9679fcb8ab6644fe21cc7e652cb615e2b"},{"tags":["x_refsource_MISC"],"url":"https://github.com/michaelschwarz/Ajax.NET-Professional/releases/tag/v21.12.22.1"}],"source":{"advisory":"GHSA-5q7q-qqw2-hjq7","discovery":"UNKNOWN"},"title":"Cross-Site Scripting in AjaxNetProfessional","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2021-43853","STATE":"PUBLIC","TITLE":"Cross-Site Scripting in AjaxNetProfessional"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Ajax.NET-Professional","version":{"version_data":[{"version_value":"< 21.12.22.1"}]}}]},"vendor_name":"michaelschwarz"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Ajax.NET Professional (AjaxPro) is an AJAX framework available for Microsoft ASP.NET. Affected versions of this package are vulnerable to JavaScript object injection which may result in cross site scripting when leveraged by a malicious user. The affected core relates to JavaScript object creation when parsing json input. Releases before version 21.12.22.1 are affected. A workaround exists that replaces one of the core JavaScript files embedded in the library. See the GHSA-5q7q-qqw2-hjq7 for workaround details."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.7,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"}]}]},"references":{"reference_data":[{"name":"https://github.com/michaelschwarz/Ajax.NET-Professional/security/advisories/GHSA-5q7q-qqw2-hjq7","refsource":"CONFIRM","url":"https://github.com/michaelschwarz/Ajax.NET-Professional/security/advisories/GHSA-5q7q-qqw2-hjq7"},{"name":"https://github.com/michaelschwarz/Ajax.NET-Professional/commit/c89e39b9679fcb8ab6644fe21cc7e652cb615e2b","refsource":"MISC","url":"https://github.com/michaelschwarz/Ajax.NET-Professional/commit/c89e39b9679fcb8ab6644fe21cc7e652cb615e2b"},{"name":"https://github.com/michaelschwarz/Ajax.NET-Professional/releases/tag/v21.12.22.1","refsource":"MISC","url":"https://github.com/michaelschwarz/Ajax.NET-Professional/releases/tag/v21.12.22.1"}]},"source":{"advisory":"GHSA-5q7q-qqw2-hjq7","discovery":"UNKNOWN"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T04:10:16.314Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/michaelschwarz/Ajax.NET-Professional/security/advisories/GHSA-5q7q-qqw2-hjq7"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/michaelschwarz/Ajax.NET-Professional/commit/c89e39b9679fcb8ab6644fe21cc7e652cb615e2b"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/michaelschwarz/Ajax.NET-Professional/releases/tag/v21.12.22.1"}]}]},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2021-43853","datePublished":"2021-12-22T20:55:09.000Z","dateReserved":"2021-11-16T00:00:00.000Z","dateUpdated":"2024-08-04T04:10:16.314Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}