{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-2476","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-05-02T12:01:35.109Z","datePublished":"2023-05-02T13:31:03.477Z","dateUpdated":"2024-08-02T06:26:08.853Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-23T05:17:27.842Z"},"title":"Dromara J2eeFAST Announcement cross site scripting","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"CWE-79 Cross Site Scripting"}]}],"affected":[{"vendor":"Dromara","product":"J2eeFAST","versions":[{"version":"2.0","status":"affected"},{"version":"2.1","status":"affected"},{"version":"2.2","status":"affected"},{"version":"2.3","status":"affected"},{"version":"2.4","status":"affected"},{"version":"2.5","status":"affected"},{"version":"2.6","status":"affected"}],"modules":["Announcement Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in Dromara J2eeFAST up to 2.6.0. It has been classified as problematic. Affected is an unknown function of the component Announcement Handler. The manipulation of the argument 系统工具/公告管理 leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 7a9e1a00e3329fdc0ae05f7a8257cce77037134d. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-227868."},{"lang":"de","value":"Es wurde eine problematische Schwachstelle in Dromara J2eeFAST bis 2.6.0 ausgemacht. Dabei betrifft es einen unbekannter Codeteil der Komponente Announcement Handler. Durch die Manipulation des Arguments 系统工具/公告管理 mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung. Der Patch wird als 7a9e1a00e3329fdc0ae05f7a8257cce77037134d bezeichnet. Als bestmögliche Massnahme wird Patching empfohlen."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":3.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.5,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N"}}],"timeline":[{"time":"2023-05-02T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-05-02T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-05-02T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-05-24T18:42:56.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"VulDB Gitee Analyzer","type":"tool"}],"references":[{"url":"https://vuldb.com/?id.227868","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.227868","tags":["signature","permissions-required"]},{"url":"https://gitee.com/dromara/J2EEFAST/issues/I6W380","tags":["exploit","issue-tracking"]},{"url":"https://gitee.com/dromara/J2EEFAST/commit/7a9e1a00e3329fdc0ae05f7a8257cce77037134d","tags":["patch"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T06:26:08.853Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.227868","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.227868","tags":["signature","permissions-required","x_transferred"]},{"url":"https://gitee.com/dromara/J2EEFAST/issues/I6W380","tags":["exploit","issue-tracking","x_transferred"]},{"url":"https://gitee.com/dromara/J2EEFAST/commit/7a9e1a00e3329fdc0ae05f7a8257cce77037134d","tags":["patch","x_transferred"]}]}]}}