CVE-2024-9506 – Regular Expression Denial of Service (ReDoS)
https://notcve.org/view.php?id=CVE-2024-9506
Improper regular expression in Vue's parseHTML function leads to a potential regular expression denial of service vulnerability. • https://www.herodevs.com/vulnerability-directory/cve-2024-9506 • CWE-1333: Inefficient Regular Expression Complexity •
CVE-2024-6783 – Vue client-side XSS via prototype pollution
https://notcve.org/view.php?id=CVE-2024-6783
A vulnerability has been discovered in Vue, that allows an attacker to perform XSS via prototype pollution. The attacker could change the prototype chain of some properties such as `Object.prototype.staticClass` or `Object.prototype.staticStyle` to execute arbitrary JavaScript code. Se ha descubierto una vulnerabilidad en Vue que permite a un atacante realizar XSS mediante contaminación de prototipos. El atacante podría cambiar la cadena de prototipos de algunas propiedades como `Object.prototype.staticClass` o `Object.prototype.staticStyle` para ejecutar código JavaScript arbitrario. • https://www.herodevs.com/vulnerability-directory/cve-2024-6783---vue-client-side-xss https://www.herodevs.com/vulnerability-directory/cve-2024-6783 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2022-47762
https://notcve.org/view.php?id=CVE-2022-47762
In gin-vue-admin < 2.5.5, the download module has a Path Traversal vulnerability. • https://github.com/flipped-aurora/gin-vue-admin/issues/1309 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2022-39345 – Gin-vue-admin arbitrary file upload vulnerability caused by path traversal
https://notcve.org/view.php?id=CVE-2022-39345
Gin-vue-admin is a backstage management system based on vue and gin, which separates the front and rear of the full stack. Gin-vue-admin prior to 2.5.4 is vulnerable to path traversal, which leads to file upload vulnerabilities. Version 2.5.4 contains a patch for this issue. There are no workarounds aside from upgrading to a patched version. Gin-vue-admin es un sistema de administración de bambalinas basado en vue y gin, que separa la parte delantera y la trasera de la pila completa. • https://github.com/flipped-aurora/gin-vue-admin/blob/main/server/service/system/sys_auto_code.go https://github.com/flipped-aurora/gin-vue-admin/issues/1263 https://github.com/flipped-aurora/gin-vue-admin/pull/1264 https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-7gc4-r5jr-9hxv • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-23: Relative Path Traversal •
CVE-2022-39305 – Gin-vue-admin vulnerable to Unrestricted Upload of File with Dangerous Type
https://notcve.org/view.php?id=CVE-2022-39305
Gin-vue-admin is a backstage management system based on vue and gin, which separates the front and rear of the full stack. Versions prior to 2.5.4 contain a file upload ability. The affected code fails to validate fileMd5 and fileName parameters, resulting in an arbitrary file being read. This issue is patched in 2.5.4b. There are no known workarounds. • https://github.com/flipped-aurora/gin-vue-admin/blob/main/server/utils/breakpoint_continue.go https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-wrmq-4v4c-gxp2 • CWE-434: Unrestricted Upload of File with Dangerous Type •