CVE-2023-0738

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-0738
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-0738.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-0738
Withdrawn
2025-07-04T06:59:39.027169Z
Published
2023-04-04T23:15:07Z
Modified
2025-07-01T14:24:58.248885Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

OrangeScrum version 2.0.11 allows an external attacker to obtain arbitrary user accounts from the application. This is possible because the application returns malicious user input in the response with the content-type set to text/html.

References

Affected packages

Git / github.com/orangescrum/orangescrum

Affected ranges

Type
GIT
Repo
https://github.com/orangescrum/orangescrum
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

V2.*

V2.0.1
V2.0.10
V2.0.11
V2.0.2
V2.0.3
V2.0.4
V2.0.5
V2.0.7
V2.0.8
V2.0.9
V2.06