Refine your search
1 vulnerability found for geonode by GeoNode
CVE-2024-27091 (GCVE-0-2024-27091)
Vulnerability from nvd
Published
2024-03-27 13:01
Modified
2024-08-02 00:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
GeoNode is a geospatial content management system, a platform for the management and publication of geospatial data. An issue exists within GEONODE where the current rich text editor is vulnerable to Stored XSS. The applications cookies are set securely, but it is possible to retrieve a victims CSRF token and issue a request to change another user's email address to perform a full account takeover. Due to the script element not impacting the CORS policy, requests will succeed. This vulnerability is fixed in 4.2.3.
References
| URL | Tags | |
|---|---|---|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-27091",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-05-21T19:16:52.917125Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:46:54.543Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T00:27:57.875Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://github.com/GeoNode/geonode/security/advisories/GHSA-rwcv-whm8-fmxm",
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/GeoNode/geonode/security/advisories/GHSA-rwcv-whm8-fmxm"
},
{
"name": "https://github.com/GeoNode/geonode/commit/e53bdeff331f4b577918927d60477d4b50cca02f",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/GeoNode/geonode/commit/e53bdeff331f4b577918927d60477d4b50cca02f"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "geonode",
"vendor": "GeoNode",
"versions": [
{
"status": "affected",
"version": "\u003e= 3.2.0, \u003c 4.2.3"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "GeoNode is a geospatial content management system, a platform for the management and publication of geospatial data. An issue exists within GEONODE where the current rich text editor is vulnerable to Stored XSS. The applications cookies are set securely, but it is possible to retrieve a victims CSRF token and issue a request to change another user\u0027s email address to perform a full account takeover. Due to the script element not impacting the CORS policy, requests will succeed. This vulnerability is fixed in 4.2.3."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-03-27T13:01:49.004Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/GeoNode/geonode/security/advisories/GHSA-rwcv-whm8-fmxm",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/GeoNode/geonode/security/advisories/GHSA-rwcv-whm8-fmxm"
},
{
"name": "https://github.com/GeoNode/geonode/commit/e53bdeff331f4b577918927d60477d4b50cca02f",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/GeoNode/geonode/commit/e53bdeff331f4b577918927d60477d4b50cca02f"
}
],
"source": {
"advisory": "GHSA-rwcv-whm8-fmxm",
"discovery": "UNKNOWN"
},
"title": "GeoNode stored XSS to full account takeover"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2024-27091",
"datePublished": "2024-03-27T13:01:49.004Z",
"dateReserved": "2024-02-19T14:43:05.992Z",
"dateUpdated": "2024-08-02T00:27:57.875Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}