CVE-2018-1000528

Source
https://nvd.nist.gov/vuln/detail/CVE-2018-1000528
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-1000528.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2018-1000528
Related
Published
2018-06-26T16:29:01Z
Modified
2025-04-14T05:46:07.935584Z
Downstream
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

GONICUS GOsa version before commit 56070d6289d47ba3f5918885954dcceb75606001 contains a Cross Site Scripting (XSS) vulnerability in change password form (html/password.php, #308) that can result in injection of arbitrary web script or HTML. This attack appear to be exploitable via the victim must open a specially crafted web page. This vulnerability appears to have been fixed in after commit 56070d6289d47ba3f5918885954dcceb75606001.

References

Affected packages

Debian:11 / gosa

Package

Name
gosa
Purl
pkg:deb/debian/gosa?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.7.4+reloaded3-5

Ecosystem specific

{
    "urgency": "low"
}

Debian:12 / gosa

Package

Name
gosa
Purl
pkg:deb/debian/gosa?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.7.4+reloaded3-5

Ecosystem specific

{
    "urgency": "low"
}

Debian:13 / gosa

Package

Name
gosa
Purl
pkg:deb/debian/gosa?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.7.4+reloaded3-5

Ecosystem specific

{
    "urgency": "low"
}

Git / github.com/gosa-project/gosa-core

Affected ranges

Type
GIT
Repo
https://github.com/gosa-project/gosa-core
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

2.*

2.7.5
2.7.5.1
2.7.5.2