Safety vulnerability ID: 35571
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Cross-site scripting (XSS) vulnerability in util/templatetags/djblets_js.py in Djblets before 0.7.30 and 0.8.x before 0.8.3 for Django, as used in Review Board, allows remote attackers to inject arbitrary web script or HTML via a JSON object, as demonstrated by the name field when changing a user name.
Latest version: 5.1.1
A collection of useful classes and functions for developing large-scale Django-based web applications.
Cross-site scripting (XSS) vulnerability in util/templatetags/djblets_js.py in Djblets before 0.7.30 and 0.8.x before 0.8.3 for Django, as used in Review Board, allows remote attackers to inject arbitrary web script or HTML via a JSON object, as demonstrated by the name field when changing a user name.
MLIST:[oss-security] 20140606 Re: Requesting CVEs issued for two XSS vulnerabilities in Djblets (a set of Django helpers): http://seclists.org/oss-sec/2014/q2/498
MLIST:[oss-security] 20140606 Requesting CVEs issued for two XSS vulnerabilities in Djblets (a set of Django helpers): http://seclists.org/oss-sec/2014/q2/494
CONFIRM:https://code.google.com/p/reviewboard/issues/detail?id=3406: https://code.google.com/p/reviewboard/issues/detail?id=3406
CONFIRM:https://github.com/djblets/djblets/commit/50000d0bbb983fa8c097b588d06b64df8df483bd: https://github.com/djblets/djblets/commit/50000d0bbb983fa8c097b588d06b64df8df483bd
CONFIRM:https://github.com/djblets/djblets/commit/77a68c03cd619a0996f3f37337b8c39ca6643d6e: https://github.com/djblets/djblets/commit/77a68c03cd619a0996f3f37337b8c39ca6643d6e
CONFIRM:https://github.com/djblets/djblets/commit/e2c79117efd925636acd871a5f473512602243cf: https://github.com/djblets/djblets/commit/e2c79117efd925636acd871a5f473512602243cf
BID:67932: http://www.securityfocus.com/bid/67932
SECUNIA:58691: http://secunia.com/advisories/58691
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application