CVE-2024-43782

Aug. 23, 2024, 4:18 p.m.

Awaiting Analysis
CVE has been recently published to the CVE List and has been received by the NVD.

Products

Open edX

Source

security-advisories@github.com

Tags

CVE-2024-43782 details

Published : Aug. 23, 2024, 3:15 p.m.
Last Modified : Aug. 23, 2024, 4:18 p.m.

Description

This openedx-translations repository contains translation files from Open edX repositories to be kept in sync with Transifex. Before moving to pulling translations from the openedx-translations repository via openedx-atlas, translations in the edx-platform repository were validated using edx-i18n-tools. This validation included protection against malformed translations and translations-based script injections. Prior to this patch, the validation implemented in the openedx-translations repository did not include the same protections. The maintainer inspected the translations in the edx-platform directory of both the main and open-release/redwood.master branches of the openedx-translations repository and found no evidence of exploited translation strings.

CVSS Score

1 2 3 4 5 6 7.7 8 9 10

Weakness

Weakness Name Description
CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.

CVSS Data

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

Base Score

7.7

Exploitability Score

1.3

Impact Score

5.8

Base Severity

HIGH

This website uses the NVD API, but is not approved or certified by it.