{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-52585","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2024-11-14T15:05:46.766Z","datePublished":"2024-11-18T20:45:19.561Z","dateUpdated":"2024-11-21T14:47:11.984Z"},"containers":{"cna":{"title":"Autolab has HTML Injection Vulnerability","problemTypes":[{"descriptions":[{"cweId":"CWE-79","lang":"en","description":"CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","type":"CWE"}]}],"metrics":[{"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"LOW","userInteraction":"PASSIVE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"LOW","subIntegrityImpact":"LOW","subAvailabilityImpact":"NONE","baseScore":1.2,"baseSeverity":"LOW","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:U","version":"4.0"}}],"references":[{"name":"https://github.com/autolab/Autolab/security/advisories/GHSA-8qhp-jhhw-45r2","tags":["x_refsource_CONFIRM"],"url":"https://github.com/autolab/Autolab/security/advisories/GHSA-8qhp-jhhw-45r2"},{"name":"https://github.com/autolab/Autolab/commit/2429983b6caa245fea1b37f0dc236ccbcad9554c","tags":["x_refsource_MISC"],"url":"https://github.com/autolab/Autolab/commit/2429983b6caa245fea1b37f0dc236ccbcad9554c"}],"affected":[{"vendor":"autolab","product":"Autolab","versions":[{"version":"= 3.0.1","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2024-11-18T20:45:32.931Z"},"descriptions":[{"lang":"en","value":"Autolab is a course management service that enables auto-graded programming assignments. There is an HTML injection vulnerability in version 3.0.1 that can affect instructors and CAs on the grade submissions page. The issue is patched in version 3.0.2. One may apply the patch manually by editing line 589 on `gradesheet.js.erb` to take in feedback as text rather than html."}],"source":{"advisory":"GHSA-8qhp-jhhw-45r2","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-11-19T15:31:24.785079Z","id":"CVE-2024-52585","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-21T14:47:11.984Z"}}]}}