Vulnerability Details : CVE-2023-3726
Potential exploit
OCSInventory allow stored email template with special characters that lead to a Stored cross-site Scripting.
Vulnerability category: Cross site scripting (XSS)
Products affected by CVE-2023-3726
- cpe:2.3:a:ocsinventory-ng:ocsinventory-ocsreports:2.12.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-3726
0.08%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 35 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-3726
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.9
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N |
1.2
|
3.6
|
Fluid Attacks | 2024-01-04 |
6.9
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:N |
1.7
|
4.7
|
NIST | 2024-01-11 |
CWE ids for CVE-2023-3726
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: help@fluidattacks.com (Primary)
References for CVE-2023-3726
-
https://ocsinventory-ng.org/
OCS Inventory Professionnel – Solution open source d'inventaire de parc informatiqueProduct
-
https://fluidattacks.com/advisories/creed/
OCSInventory 2.12.0 - Stored XSS | Advisories | Fluid AttacksExploit;Third Party Advisory
Jump to