2 results (0.014 seconds)

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 2

The Nuxeo Platform is an open source content management platform for building business applications. In version 11.5.109, the `oauth2` REST API is vulnerable to Reflected Cross-Site Scripting (XSS). This XSS can be escalated to Remote Code Execution (RCE) by levering the automation API. • https://github.com/nuxeo/nuxeo/blob/master/modules/platform/nuxeo-platform-oauth/src/main/java/org/nuxeo/ecm/webengine/oauth2/OAuth2Callback.java https://securitylab.github.com/advisories/GHSL-2021-072-nuxeo • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE-502: Deserialization of Untrusted Data •

CVSS: 8.8EPSS: 5%CPEs: 4EXPL: 2

Directory traversal vulnerability in the file import feature in Nuxeo Platform 6.0, 7.1, 7.2, and 7.3 allows remote authenticated users to upload and execute arbitrary JSP code via a .. (dot dot) in the X-File-Name header. Vulnerabilidad de salto de directorio en la característica de importación de archivo en Nuxeo Platform 6.0, 7.1, 7.2 y 7.3 permite a usuarios remotos autenticados cargar y ejecutar código JSP arbitrario a través de un .. (dot dot) en la cabecera X-File-Name. Nuxeo Platform versions 6.0 (LTS 2014), 7.1, 7.2, and 7.3 suffer from a remote shell upload vulnerability. • https://www.exploit-db.com/exploits/41748 http://www.openwall.com/lists/oss-security/2017/03/23/6 http://www.securityfocus.com/bid/97083 https://sysdream.com/news/lab/2017-03-23-cve-2017-5869-nuxeo-platform-remote-code-execution • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •