Skip to content

Commit 63ec801

Browse files
1 parent 0459935 commit 63ec801

File tree

4 files changed

+167
-45
lines changed

4 files changed

+167
-45
lines changed
Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,64 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-hp88-hfjw-2hg4",
4+
"modified": "2025-05-06T18:51:17Z",
5+
"published": "2025-03-28T15:31:56Z",
6+
"withdrawn": "2025-05-06T18:51:17Z",
7+
"aliases": [],
8+
"summary": "Duplicate Advisory: HAL Cross Site Scripting (XSS) vulnerability of user input when storing it in a data store",
9+
"details": "# Duplicate Advisory\nThis advisory has been withdrawn because it is a duplicate of GHSA-f7jh-m6wp-jm7f. This link is maintained to preserve external references.\n\n# Original Description\n\nA flaw was found in the JBoss EAP Management Console, where a stored Cross-site scripting vulnerability occurs when an application improperly sanitizes user input before storing it in a data store. When this stored data is later included in web pages without adequate sanitization, malicious scripts can execute in the context of users who view these pages, leading to potential data theft, session hijacking, or other malicious activities.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"
14+
}
15+
],
16+
"affected": [
17+
{
18+
"package": {
19+
"ecosystem": "Maven",
20+
"name": "org.jboss.hal:hal-console"
21+
},
22+
"ranges": [
23+
{
24+
"type": "ECOSYSTEM",
25+
"events": [
26+
{
27+
"introduced": "0"
28+
},
29+
{
30+
"fixed": "3.7.11.Final"
31+
}
32+
]
33+
}
34+
]
35+
}
36+
],
37+
"references": [
38+
{
39+
"type": "ADVISORY",
40+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-2901"
41+
},
42+
{
43+
"type": "WEB",
44+
"url": "https://access.redhat.com/security/cve/CVE-2025-2901"
45+
},
46+
{
47+
"type": "WEB",
48+
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355685"
49+
},
50+
{
51+
"type": "PACKAGE",
52+
"url": "https://github.com/hal/console"
53+
}
54+
],
55+
"database_specific": {
56+
"cwe_ids": [
57+
"CWE-79"
58+
],
59+
"severity": "MODERATE",
60+
"github_reviewed": true,
61+
"github_reviewed_at": "2025-05-06T18:51:17Z",
62+
"nvd_published_at": "2025-03-28T14:15:22Z"
63+
}
64+
}
Original file line numberDiff line numberDiff line change
@@ -1,26 +1,47 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2544-hpcq-6g27",
4-
"modified": "2025-05-06T15:31:04Z",
4+
"modified": "2025-05-06T18:51:10Z",
55
"published": "2025-05-05T21:31:28Z",
66
"aliases": [
77
"CVE-2025-29573"
88
],
9+
"summary": "Mezzanine CMS Cross-Site Scripting (XSS) vulnerability",
910
"details": "Cross-Site Scripting (XSS) vulnerability exists in Mezzanine CMS 6.0.0 in the \"View Entries\" feature within the Forms module.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "PyPI",
21+
"name": "Mezzanine"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"last_affected": "6.0.0"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
2041
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-29573"
2142
},
2243
{
23-
"type": "WEB",
44+
"type": "PACKAGE",
2445
"url": "https://github.com/stephenmcd/mezzanine"
2546
},
2647
{
@@ -33,8 +54,8 @@
3354
"CWE-79"
3455
],
3556
"severity": "MODERATE",
36-
"github_reviewed": false,
37-
"github_reviewed_at": null,
57+
"github_reviewed": true,
58+
"github_reviewed_at": "2025-05-06T18:51:10Z",
3859
"nvd_published_at": "2025-05-05T19:15:55Z"
3960
}
4061
}
Lines changed: 77 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,77 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-f7jh-m6wp-jm7f",
4+
"modified": "2025-05-06T18:51:27Z",
5+
"published": "2025-05-06T18:51:27Z",
6+
"aliases": [
7+
"CVE-2025-2901"
8+
],
9+
"summary": "HAL Cross Site Scripting (XSS) vulnerability of user input when storing it in a data store",
10+
"details": "A flaw was found in the JBoss EAP Management Console, where a stored Cross-site scripting vulnerability occurs when an application improperly sanitizes user input before storing it in a data store. When this stored data is later included in web pages without adequate sanitization, malicious scripts can execute in the context of users who view these pages, leading to potential data theft, session hijacking, or other malicious activities.\n\n### Impact\nCross-site scripting (XSS) vulnerability in the management console.\n\n### Patches\nFixed in [HAL 3.7.11.Final](https://github.com/hal/console/releases/tag/v3.7.11)\n\n### Workarounds\nNo workaround available",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Maven",
21+
"name": "org.jboss.hal:hal-console"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "3.7.11.Final"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "WEB",
41+
"url": "https://github.com/hal/console/security/advisories/GHSA-f7jh-m6wp-jm7f"
42+
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-2901"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/hal/console/commit/216de3b8aa82ea92df10cc296d88c68467cf2c52"
50+
},
51+
{
52+
"type": "WEB",
53+
"url": "https://access.redhat.com/security/cve/CVE-2025-2901"
54+
},
55+
{
56+
"type": "WEB",
57+
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355685"
58+
},
59+
{
60+
"type": "PACKAGE",
61+
"url": "https://github.com/hal/console"
62+
},
63+
{
64+
"type": "WEB",
65+
"url": "https://github.com/hal/console/releases/tag/v3.7.11"
66+
}
67+
],
68+
"database_specific": {
69+
"cwe_ids": [
70+
"CWE-79"
71+
],
72+
"severity": "MODERATE",
73+
"github_reviewed": true,
74+
"github_reviewed_at": "2025-05-06T18:51:27Z",
75+
"nvd_published_at": null
76+
}
77+
}

advisories/unreviewed/2025/03/GHSA-hp88-hfjw-2hg4/GHSA-hp88-hfjw-2hg4.json

Lines changed: 0 additions & 40 deletions
This file was deleted.

0 commit comments

Comments
 (0)