Exploit Report

Computer Security And Bug Information


CVE Title
Published Date2023-05-25T18:15Z
Modified Date2023-06-01T13:40Z
CWE TypeCWE-79
DescriptionIris is a web collaborative platform aiming to help incident responders sharing technical details during investigations. A stored Cross-Site Scripting (XSS) vulnerability has been identified in iris-web, affecting multiple locations . The vulnerability in allows an attacker to inject malicious scripts into the application, which are then executed when a user visits the affected locations. This can lead to unauthorized access, data theft, or other malicious activities. An attacker need to be authenticated on the application to exploit this vulnerability. The issue was patched in version 2.2.1 of iris-web.
By clicking these links you will leave this website. We do not endorse and will not be held accountable for any activity on external sites.
Reference URLhttps://github.com/dfir-iris/iris-web/releases/tag/v2.2.1
Reference DescriptionMISC https://github.com/dfir-iris/iris-web/releases/tag/v2.2.1
Reference URLhttps://github.com/dfir-iris/iris-web/security/advisories/GHSA-gc6j-6276-2m49
Reference DescriptionMISC https://github.com/dfir-iris/iris-web/security/advisories/GHSA-gc6j-6276-2m49
TagsRelease Notes

This site's data is aggregated programmatically and provided "as is" without any representations or warranties, express or implied. Exploit.report is not affiliated with the The MITRE Corporation, U.S. Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA), or US government in any way. CVE and the CVE logo are registered trademarks of The MITRE Corporation

© 2022 Exploit.Report | Data | Contact | Privacy Policy | Articles