Summary | It was possible to execute JavaScript code in the Microblog search. |
---|---|
Advisory Release Date | 2022-09-13 |
Product | Microblogging for Confluence Linchpin Intranet Suite |
Affected Versions | Linchpin Intranet Suite 5.3.2 and all prior versions Microblogging for Confluence 6.2.2 and all prior versions |
Fixed Versions | Linchpin Intranet Suite 5.3.3 Microblogging for Confluence 6.2.3 |
Problem
The issues were discovered by Jafar Abo Nada via the Atlassian bug bounty program. The researcher could identify that an attacker could potentially inject executable Javascript code within the Microblog search, that was then reflected to the viewing user.
Affected are the apps "Microblogging for Confluence" up to and including version 6.2.3 and "Linchpin Intranet Suite" up to and including version 5.3.2.
Severity
The vulnerability is rated as 8.7 according to CVSS. The score is calculated as CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N.
Solution
For Microblogging for Confluence customers: Update to Microblogging for Confluence version 6.2.3 or later.
For Linchpin Suite customers: Update to Linchpin Suite 5.3.3 or later.
Should you be unable to update the Linchpin Intranet Suite to one of the listed versions, please reach out to our support team at https://seibert.biz/help.
Link to this page: https://seibert.biz/20220913cvembxss