Description
A cross-site scripting (XSS) vulnerability in CesiumJS v1.111 allows attackers to execute arbitrary code in the context of the victim's browser via sending a crafted payload to /container_files/public_html/doc/index.html. NOTE: the vendor’s position is that Apps/Sandcastle/standalone.html is part of the CesiumGS/cesium GitHub repository, but is demo code that is not part of the CesiumJS JavaScript library product.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-4532-pmx7-9ww7 | Cross-site Scripting in cesium |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-02T21:23:38.574Z
Reserved: 2023-11-13T00:00:00.000Z
Link: CVE-2023-48094
No data.
Status : Modified
Published: 2023-11-14T17:15:08.013
Modified: 2024-11-21T08:31:05.690
Link: CVE-2023-48094
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA