LogicalDOC Enterprise and Community Edition (CE) are vulnerable to a stored (persistent, or "Type II") cross-site scripting (XSS) condition in the in-app messaging system (both subject and message bodies).
References
Link | Resource |
---|---|
https://www.rapid7.com/blog/post/2023/02/07/multiple-dms-xss-cve-2022-47412-through-cve-20222-47419/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
16 Feb 2023, 17:05
Type | Values Removed | Values Added |
---|---|---|
First Time |
Logicaldoc logicaldoc
Logicaldoc |
|
CPE | cpe:2.3:a:logicaldoc:logicaldoc:8.8.2:*:*:*:enterprise:*:*:* cpe:2.3:a:logicaldoc:logicaldoc:8.7.3:*:*:*:community:*:*:* |
|
CWE | CWE-79 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
References | (MISC) https://www.rapid7.com/blog/post/2023/02/07/multiple-dms-xss-cve-2022-47412-through-cve-20222-47419/ - Exploit, Third Party Advisory |
07 Feb 2023, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-02-07 22:15
Updated : 2023-12-10 14:48
NVD link : CVE-2022-47415
Mitre link : CVE-2022-47415
CVE.ORG link : CVE-2022-47415
JSON object : View
Products Affected
logicaldoc
- logicaldoc
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')