{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-4524","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","assignerShortName":"VulDB","dateUpdated":"2024-08-03T01:41:45.501Z","dateReserved":"2022-12-15T00:00:00.000Z","datePublished":"2022-12-15T00:00:00.000Z"},"containers":{"cna":{"title":"Roots soil Plugin CleanUpModule.php language_attributes cross site scripting","providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2022-12-24T21:17:34.745Z"},"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"CWE-79 Cross Site Scripting"}]}],"affected":[{"vendor":"Roots","product":"soil Plugin","versions":[{"version":"4.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as problematic, was found in Roots soil Plugin up to 4.0.x. Affected is the function language_attributes of the file src/Modules/CleanUpModule.php. The manipulation of the argument language leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 4.1.0 is able to address this issue. The name of the patch is 0c9151e00ab047da253e5cdbfccb204dd423269d. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-215904."},{"lang":"de","value":"Es wurde eine Schwachstelle in Roots soil Plugin bis 4.0.x gefunden. Sie wurde als problematisch eingestuft. Betroffen hiervon ist die Funktion language_attributes der Datei src/Modules/CleanUpModule.php. Durch das Manipulieren des Arguments language mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Ein Aktualisieren auf die Version 4.1.0 vermag dieses Problem zu lösen. Der Patch wird als 0c9151e00ab047da253e5cdbfccb204dd423269d bezeichnet. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":3.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.5,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}}],"timeline":[{"time":"2022-12-15T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2022-12-15T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2022-12-24T17:46:19.000Z","lang":"en","value":"VulDB last update"}],"references":[{"url":"https://vuldb.com/?id.215904","tags":["technical-description","vdb-entry"]},{"url":"https://github.com/roots/soil/pull/285","tags":["related"]},{"url":"https://github.com/roots/soil/commit/0c9151e00ab047da253e5cdbfccb204dd423269d","tags":["mitigation","patch"]},{"url":"https://github.com/roots/soil/releases/tag/4.1.0","tags":["mitigation"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T01:41:45.501Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.215904","tags":["technical-description","vdb-entry","x_transferred"]},{"url":"https://github.com/roots/soil/pull/285","tags":["related","x_transferred"]},{"url":"https://github.com/roots/soil/commit/0c9151e00ab047da253e5cdbfccb204dd423269d","tags":["mitigation","patch","x_transferred"]},{"url":"https://github.com/roots/soil/releases/tag/4.1.0","tags":["mitigation","x_transferred"]}]}]}}