A cross-site scripting (XSS) vulnerability in CesiumJS v1.111 allows attackers to execute arbitrary code in the context of the victim's browser via sending a crafted payload to /container_files/public_html/doc/index.html. NOTE: the vendor’s position is that Apps/Sandcastle/standalone.html is part of the CesiumGS/cesium GitHub repository, but is demo code that is not part of the CesiumJS JavaScript library product.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-4532-pmx7-9ww7 Cross-site Scripting in cesium
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-02T21:23:38.574Z

Reserved: 2023-11-13T00:00:00

Link: CVE-2023-48094

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-11-14T17:15:08.013

Modified: 2024-11-21T08:31:05.690

Link: CVE-2023-48094

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses