{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-50339","assignerOrgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","state":"PUBLISHED","assignerShortName":"jpcert","dateReserved":"2023-12-07T02:39:54.055Z","datePublished":"2023-12-26T07:20:31.556Z","dateUpdated":"2024-09-09T18:00:25.425Z"},"containers":{"cna":{"affected":[{"vendor":"WESEEK, Inc.","product":"GROWI","versions":[{"version":"v6.1.11","status":"affected"}]}],"descriptions":[{"lang":"en","value":"Stored cross-site scripting vulnerability exists in the User Management (/admin/users) page of GROWI versions prior to v6.1.11. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product."}],"problemTypes":[{"descriptions":[{"description":"Cross-site scripting (XSS)","lang":"en","type":"text"}]}],"references":[{"url":"https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/"},{"url":"https://jvn.jp/en/jp/JVN18715935/"}],"providerMetadata":{"orgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","shortName":"jpcert","dateUpdated":"2023-12-26T07:20:31.556Z"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T22:16:46.697Z"},"title":"CVE Program Container","references":[{"url":"https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/","tags":["x_transferred"]},{"url":"https://jvn.jp/en/jp/JVN18715935/","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-02-27T18:02:51.280364Z","id":"CVE-2023-50339","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-09T18:00:25.425Z"}}]}}