In Intland codeBeamer ALM 9.5 and earlier, there is stored XSS via the Trackers Title parameter.

http://nonprofit-success.com/tag/time-management/ Overview :
In Intland codeBeamer ALM 9.5 and earlier, there is stored XSS via the Trackers Title parameter.codeBeamer versions 9.5 and below suffer from multiple persistent cross site scripting vulnerabilities.

CVE-2019-19912
Overview

In Intland codeBeamer ALM 9.5 and earlier, a cross-site scripting (XSS) vulnerability in the Upload Flash File feature allows authenticated remote attackers to inject arbitrary scripts via an active script embedded in an SWF file.

CVE-2019-19913

Overview

In Intland codeBeamer ALM 9.5 and earlier, there is stored XSS via the Trackers Title parameter.

CVE-2019-19913

Packet Storm Security note - Finding one of two:



codeBeamer – Stored Cross-Site Scripting

===============================================================================

Identifiers

-------------------------------------------------

* CVE-2019-19912

CVSSv3 score

-------------------------------------------------

6.4 (AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:H/A:H)

Vendor

-------------------------------------------------

Intland – Codebeamer (https://codebeamer.com)

Product

-------------------------------------------------

codeBeamer ALM is a holistically integrated, collaborative Application Lifecycle Management platform with capabilities that cover your entire product development lifecycle.

Affected versions

-------------------------------------------------

 - codebeamer 9.5 and below

Credit

-------------------------------------------------

Georg Ph E Heise (@gpheheise) / Lufthansa Industry Solutions (@LHIND_DLH)

Vulnerability summary

-------------------------------------------------

Intland Software has a stored XSS vulnerability in file attachment section.

Technical details

------------------------------------------------

The upload section is vulnerable to accept malicious crafted SWF file.

.

Proof of concept

-------------------------------------------------

To exploit this vulnerability standard male formatted SWF file like the ones available on github

·       https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/XSS%20Injection`

Solution

-------------------------------------------------

Contact vendor for a solution

Timeline

-------------------------------------------------

Date        | Status

------------|-----------------------------

20-DEZ-2019 | Reported to vendor

03-JAN-2020 | Acknowledged by vendor

09-MAR-2020 | Patch available

26-MAR-2020 | Public disclosure


===============================================================================
Packet Storm Security note - Finding two of two:


codeBeamer – Stored Cross-Site Scripting

===============================================================================

Identifiers

-------------------------------------------------

* CVE-2019-19913

CVSSv3 score

-------------------------------------------------

6.4 ([AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:H/A:H](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:H/A:H&version=3.1))

Vendor

-------------------------------------------------

Intland – Codebeamer (https://codebeamer.com)

Product

-------------------------------------------------

codeBeamer ALM is a holistically integrated, collaborative Application Lifecycle Management platform with capabilities that cover your entire product development lifecycle.

Affected versions

-------------------------------------------------

 - codebeamer 9.5 and below

Credit

-------------------------------------------------

Georg Ph E Heise (@gpheheise) / Lufthansa Industry Solutions (@LHIND_DLH)

Vulnerability summary

-------------------------------------------------

Intland Software has a stored XSS vulnerability in their CodeBeamer 9.5 ALM Tackers Title parameter.

Technical details

------------------------------------------------

The Tackers Heading is vulnerable to a stored cross site scripting (XSS) attack

An Attacker has to create or modify a Tracker Heading with a direct XSS to exploit any project user who's viewing the Tracker or the Tracker notes.

Proof of concept

-------------------------------------------------

The following evidence is provided to illustrate the existence and

exploitation:

Create a release with the heading similar to this

<script> alert(‘hacked’)</script>

`

Solution

-------------------------------------------------

Contact vendor for a solution

Timeline

-------------------------------------------------

Date        | Status

------------|-----------------------------

20-DEZ-2019 | Reported to vendor

03-JAN-2020 | Acknowledged by vendor

09-MAR-2020 | Patch available

26-MAR-2020 | Public disclosure

FMS 5.9.5 Hotfix HFIX-314 (315091)

Common Vulnerabilityies and Exposures

Contact us to get started

CVE-2024-21513 : LANGCHAIN-EXPERIMENTAL UP TO 0.0.20 DATABASE EVAL CODE INJECTION

CVE-2024-21513 : LANGCHAIN-EXPERIMENTAL UP TO 0.0.20 DATABASE EVAL CODE INJECTION

Description Versions of the package langchain-experimental from 0.0.15 and before 0.0.21 are vulnerable to Arbitrary Code Execution when retrieving values

CVE-2024-6737 : 2100 TECHNOLOGY ELECTRONIC OFFICIAL DOCUMENT MANAGEMENT SYSTEM UP TO 5.0.76 SETTING ACCESS CONTROL

CVE-2024-6737 : 2100 TECHNOLOGY ELECTRONIC OFFICIAL DOCUMENT MANAGEMENT SYSTEM UP TO 5.0.76 SETTING ACCESS CONTROL

Description The access control in the Electronic Official Document Management System from 2100 TECHNOLOGY is not properly implemented, allowing remote

CVE-2024-6345 : PYPA SETUPTOOLS UP TO 69.1.1 PACKAGE_INDEX CODE INJECTION

CVE-2024-6345 : PYPA SETUPTOOLS UP TO 69.1.1 PACKAGE_INDEX CODE INJECTION

Description A vulnerability in the package_index module of pypa/setuptools versions up to 69.1.1 allows for remote code execution via its