First published: Mon Jun 16 2014(Updated: )
A cross-site scripting (XSS) vulnerability in `util/templatetags/djblets_js.py` in Djblets before 0.7.30 and 0.8.x before 0.8.3 for Django, as used in Review Board, allows remote attackers to inject arbitrary web script or HTML via a JSON object, as demonstrated by the name field when changing a user name.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/Djblets | >=0.8<0.8.3 | 0.8.3 |
pip/Djblets | <0.7.30 | 0.7.30 |
Review Board Djblets | <=0.7.29 | |
Review Board Djblets | =0.7.27 | |
Review Board Djblets | =0.7.28 | |
Review Board Djblets | =0.8.1 | |
Review Board Djblets | =0.8.2 | |
ReviewBoard ReviewBoard | ||
Review Board |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3994 is classified as a medium severity cross-site scripting (XSS) vulnerability.
To fix CVE-2014-3994, upgrade Djblets to version 0.8.3 or above, or to version 0.7.30.
CVE-2014-3994 affects Djblets versions before 0.7.30 and 0.8.x before 0.8.3, as well as certain versions of Review Board.
CVE-2014-3994 is a cross-site scripting (XSS) vulnerability that allows attackers to inject arbitrary web scripts or HTML.
CVE-2014-3994 can lead to unauthorized actions on behalf of users, potentially compromising their data or account.