org.yamcs:yamcs-web@5.7.3 vulnerabilities

  • latest version

    5.10.9

  • latest non vulnerable version

  • first published

    5 years ago

  • latest version published

    1 months ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the org.yamcs:yamcs-web package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Cross-site Scripting (XSS)

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) when displaying the Telecommands uplinked to the spacecraft. An attacker can trigger the execution of malicious code by setting the Telecommand's name to a malicious JavaScript payload. This is only exploitable if the user navigates to the Archive Browser, zooms in on the timeline to review the Telecommands and hovers the mouse cursor over one of the Telecommands containing the malicious JavaScript. This will display a Tooltip, which will trigger the execution of the malicious code.

    How to fix Cross-site Scripting (XSS)?

    Upgrade org.yamcs:yamcs-web to version 5.9.3 or higher.

    [,5.9.3)
    • M
    Cross-site Scripting (XSS)

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to unsanitized script content for HTML tags. Once the file is loaded and the user navigates to it, the code instead of being shown, is executed by the browser.

    Note:

    The user has no way of knowing that the malicious code is being executed on their browser. It is even more trickier to detect if the script is hidden in a legitimate JavaScript code.

    How to fix Cross-site Scripting (XSS)?

    Upgrade org.yamcs:yamcs-web to version 5.8.8 or higher.

    [,5.8.8)