First published: Tue May 10 2022(Updated: )
A vulnerability in Black Duck Hub’s embedded MadCap Flare documentation files could allow an unauthenticated remote attacker to conduct a cross-site scripting attack. The vulnerability is due to improper validation of user-supplied input to MadCap Flare's framework embedded within Black Duck Hub's Help Documentation to supply content. An attacker could exploit this vulnerability by convincing a user to click a link designed to pass malicious input to the interface. A successful exploit could allow the attacker to conduct cross-site scripting attacks and gain access to sensitive browser-based information.
Credit: disclosure@synopsys.com
Affected Software | Affected Version | How to fix |
---|---|---|
Black Duck Hub | <2022.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-30278 is a vulnerability in Black Duck Hub's embedded MadCap Flare documentation files that could allow an unauthenticated remote attacker to conduct a cross-site scripting attack.
The severity of CVE-2022-30278 is medium with a CVSS score of 6.1.
An unauthenticated remote attacker can exploit CVE-2022-30278 by injecting malicious script code into the user-supplied input to MadCap Flare's framework embedded within Black Duck Hub's web application.
To fix CVE-2022-30278, it is recommended to update Black Duck Hub to version 2022.4.0 or later, as provided by Synopsys.
For more information about CVE-2022-30278, you can refer to the advisory published by Synopsys at https://www.synopsys.com/blogs/software-security/cyrc-advisory-cross-site-scripting-vulnerability-black-duck-hub/