39.4.0
9 years ago
1 days ago
Known vulnerabilities in the rucio-webui package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the rendering of attacker-controlled input in Custom RSE Attribute. An attacker can execute arbitrary JavaScript in the context of the WebUI by injecting malicious payloads that are stored and later rendered to authenticated users. This may lead to session token theft, unauthorized actions, or exfiltration of sensitive data when a user views a compromised resource. How to fix Cross-site Scripting (XSS)? Upgrade | [,35.8.3)[36.0.0rc1,38.5.4)[39.0.0rc1,39.3.1) |
Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in the rendering of the How to fix Cross-site Scripting (XSS)? Upgrade | [,35.8.3)[36.0.0rc1,38.5.4)[39.0.0rc1,39.3.1) |
Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in the rendering of user-controlled input in the How to fix Cross-site Scripting (XSS)? Upgrade | [,35.8.3)[36.0.0rc1,38.5.4)[39.0.0rc1,39.3.1) |
Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the rendering of RSE metadata in the WebUI. An attacker can execute arbitrary JavaScript in the users' context by injecting malicious scripts into the How to fix Cross-site Scripting (XSS)? Upgrade | [,35.8.3)[36.0.0rc1,38.5.4)[39.0.0rc1,39.3.1) |
Affected versions of this package are vulnerable to Sensitive Cookie Without "HttpOnly" Flag via the How to fix Sensitive Cookie Without "HttpOnly" Flag? Upgrade | [,35.8.3)[36.0.0rc1,38.5.4)[39.0.0rc1,39.3.1) |
Affected versions of this package are vulnerable to Information Exposure via the How to fix Information Exposure? Upgrade | [,35.8.3)[36.0.0rc1,38.5.4)[39.0.0rc1,39.3.1) |