RSS   Vulnerabilities for 'Growi'   RSS

2022-04-05
 
CVE-2022-1236

CWE-521
 

 
Weak Password Requirements in GitHub repository weseek/growi prior to v5.0.0.

 
2022-01-12
 
CVE-2021-3852

CWE-639
 

 
growi is vulnerable to Authorization Bypass Through User-Controlled Key

 
2021-09-21
 
CVE-2021-20829

CWE-79
 

 
Cross-site scripting vulnerability due to the inadequate tag sanitization in GROWI versions v4.2.19 and earlier allows remote attackers to execute an arbitrary script on the web browser of the user who accesses a specially crafted page.

 
2021-03-10
 
CVE-2021-20673

CWE-79
 

 
Stored cross-site scripting vulnerability in Admin Page of GROWI (v4.2 Series) versions from v4.2.0 to v4.2.7 allows remote authenticated attackers to inject an arbitrary script via unspecified vectors.

 
 
CVE-2021-20672

CWE-79
 

 
Reflected cross-site scripting vulnerability due to insufficient verification of URL query parameters in GROWI (v4.2 Series) versions from v4.2.0 to v4.2.7 allows remote attackers to inject an arbitrary script via unspecified vectors.

 
 
CVE-2021-20671

CWE-20
 

 
Invalid file validation on the upload feature in GROWI versions v4.2.2 allows a remote attacker with administrative privilege to overwrite the files on the server, which may lead to arbitrary code execution.

 
 
CVE-2021-20670

CWE-863
 

 
Improper access control vulnerability in GROWI versions v4.2.2 and earlier allows a remote unauthenticated attacker to read the user's personal information and/or server's internal information via unspecified vectors.

 
 
CVE-2021-20669

CWE-22
 

 
Path traversal vulnerability in GROWI versions v4.2.2 and earlier allows an attacker with administrator rights to read and/or delete an arbitrary path via a specially crafted URL.

 
 
CVE-2021-20668

CWE-22
 

 
Path traversal vulnerability in GROWI versions v4.2.2 and earlier allows an attacker with administrator rights to read an arbitrary path via a specially crafted URL.

 
 
CVE-2021-20667

CWE-79
 

 
Stored cross-site scripting vulnerability due to inadequate CSP (Content Security Policy) configuration in GROWI versions v4.2.2 and earlier allows remote authenticated attackers to inject an arbitrary script via a specially crafted content.

 


Copyright 2024, cxsecurity.com

 

Back to Top