CVE-2023-0738

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-0738
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-0738.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-0738
Published
2023-04-04T23:15:07Z
Modified
2025-02-14T11:40:24.985424Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

OrangeScrum version 2.0.11 allows an external attacker to obtain arbitrary user accounts from the application. This is possible because the application returns malicious user input in the response with the content-type set to text/html.

References

Affected packages

Git / github.com/orangescrum/orangescrum

Affected ranges

Type
GIT
Repo
https://github.com/orangescrum/orangescrum
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

V2.*

V2.0.1
V2.0.10
V2.0.11
V2.0.2
V2.0.3
V2.0.4
V2.0.5
V2.0.7
V2.0.8
V2.0.9
V2.06