CVE-2023-0738

OrangeScrum version 2.0.11 allows an external attacker to obtain arbitrary user accounts from the application. This is possible because the application returns malicious user input in the response with the content-type set to text/html.
Configurations

Configuration 1 (hide)

cpe:2.3:a:orangescrum:orangescrum:2.0.11:*:*:*:*:*:*:*

History

13 Feb 2025, 16:15

Type Values Removed Values Added
References (MISC) https://fluidattacks.com/advisories/eilish/ - Exploit, Third Party Advisory () https://fluidattacks.com/advisories/eilish/ - Exploit, Third Party Advisory
References (MISC) https://github.com/Orangescrum/orangescrum/ - Product () https://github.com/Orangescrum/orangescrum/ - Product

17 Apr 2023, 16:57

Type Values Removed Values Added
CWE CWE-79
First Time Orangescrum orangescrum
Orangescrum
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
References (MISC) https://fluidattacks.com/advisories/eilish/ - (MISC) https://fluidattacks.com/advisories/eilish/ - Exploit, Third Party Advisory
References (MISC) https://github.com/Orangescrum/orangescrum/ - (MISC) https://github.com/Orangescrum/orangescrum/ - Product
CPE cpe:2.3:a:orangescrum:orangescrum:2.0.11:*:*:*:*:*:*:*

04 Apr 2023, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-04-04 23:15

Updated : 2025-02-13 16:15


NVD link : CVE-2023-0738

Mitre link : CVE-2023-0738


JSON object : View

Products Affected

orangescrum

  • orangescrum
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')