Show plain JSON{"containers": {"cna": {"affected": [{"product": "jitsi-meet", "vendor": "jitsi", "versions": [{"status": "affected", "version": "< 2.0.6173"}]}], "descriptions": [{"lang": "en", "value": "Jitsi Meet is an open source video conferencing application. Versions prior to 2.0.6173 are vulnerable to client-side cross-site scripting via injecting properties into JSON objects that were not properly escaped. There are no known incidents related to this vulnerability being exploited in the wild. This issue is fixed in Jitsi Meet version 2.0.6173. There are no known workarounds aside from upgrading."}], "metrics": [{"cvssV3_1": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1"}}], "problemTypes": [{"descriptions": [{"cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", "lang": "en", "type": "CWE"}]}, {"descriptions": [{"cweId": "CWE-1321", "description": "CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"dateUpdated": "2021-09-15T17:15:12", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M"}, "references": [{"tags": ["x_refsource_CONFIRM"], "url": "https://github.com/jitsi/jitsi-meet/security/advisories/GHSA-6582-8v9q-v3fg"}, {"tags": ["x_refsource_MISC"], "url": "https://github.com/jitsi/jitsi-meet/pull/9320"}, {"tags": ["x_refsource_MISC"], "url": "https://github.com/jitsi/jitsi-meet/pull/9404"}, {"tags": ["x_refsource_MISC"], "url": "https://hackerone.com/reports/1214493"}], "source": {"advisory": "GHSA-6582-8v9q-v3fg", "discovery": "UNKNOWN"}, "title": "DOM-based XSS/Content Spoofing via Prototype Pollution", "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-39205", "STATE": "PUBLIC", "TITLE": "DOM-based XSS/Content Spoofing via Prototype Pollution"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "jitsi-meet", "version": {"version_data": [{"version_value": "< 2.0.6173"}]}}]}, "vendor_name": "jitsi"}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "Jitsi Meet is an open source video conferencing application. Versions prior to 2.0.6173 are vulnerable to client-side cross-site scripting via injecting properties into JSON objects that were not properly escaped. There are no known incidents related to this vulnerability being exploited in the wild. This issue is fixed in Jitsi Meet version 2.0.6173. There are no known workarounds aside from upgrading."}]}, "impact": {"cvss": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"}]}, {"description": [{"lang": "eng", "value": "CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')"}]}]}, "references": {"reference_data": [{"name": "https://github.com/jitsi/jitsi-meet/security/advisories/GHSA-6582-8v9q-v3fg", "refsource": "CONFIRM", "url": "https://github.com/jitsi/jitsi-meet/security/advisories/GHSA-6582-8v9q-v3fg"}, {"name": "https://github.com/jitsi/jitsi-meet/pull/9320", "refsource": "MISC", "url": "https://github.com/jitsi/jitsi-meet/pull/9320"}, {"name": "https://github.com/jitsi/jitsi-meet/pull/9404", "refsource": "MISC", "url": "https://github.com/jitsi/jitsi-meet/pull/9404"}, {"name": "https://hackerone.com/reports/1214493", "refsource": "MISC", "url": "https://hackerone.com/reports/1214493"}]}, "source": {"advisory": "GHSA-6582-8v9q-v3fg", "discovery": "UNKNOWN"}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-04T01:58:18.260Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://github.com/jitsi/jitsi-meet/security/advisories/GHSA-6582-8v9q-v3fg"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://github.com/jitsi/jitsi-meet/pull/9320"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://github.com/jitsi/jitsi-meet/pull/9404"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://hackerone.com/reports/1214493"}]}]}, "cveMetadata": {"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-39205", "datePublished": "2021-09-15T17:15:12", "dateReserved": "2021-08-16T00:00:00", "dateUpdated": "2024-08-04T01:58:18.260Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}