Bookstackapp

Bookstack

22 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.4%
  • Veröffentlicht 05.11.2021 15:15:07
  • Zuletzt bearbeitet 21.11.2024 06:22:46

bookstack is vulnerable to Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Exploit
  • EPSS 0.23%
  • Veröffentlicht 27.10.2021 22:15:07
  • Zuletzt bearbeitet 21.11.2024 06:22:44

bookstack is vulnerable to Unrestricted Upload of File with Dangerous Type

Exploit
  • EPSS 0.38%
  • Veröffentlicht 15.10.2021 14:15:07
  • Zuletzt bearbeitet 21.11.2024 06:22:41

bookstack is vulnerable to Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Exploit
  • EPSS 0.18%
  • Veröffentlicht 06.09.2021 12:15:08
  • Zuletzt bearbeitet 21.11.2024 06:22:22

bookstack is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Exploit
  • EPSS 0.26%
  • Veröffentlicht 06.09.2021 12:15:08
  • Zuletzt bearbeitet 21.11.2024 06:22:22

bookstack is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Exploit
  • EPSS 0.24%
  • Veröffentlicht 02.09.2021 12:15:07
  • Zuletzt bearbeitet 21.11.2024 06:22:21

bookstack is vulnerable to Server-Side Request Forgery (SSRF)

  • EPSS 0.31%
  • Veröffentlicht 09.12.2020 17:15:30
  • Zuletzt bearbeitet 21.11.2024 05:19:41

BookStack is a platform for storing and organising information and documentation. In BookStack before version 0.30.5, a user with permissions to edit a page could set certain image URL's to manipulate functionality in the exporting system, which woul...

  • EPSS 0.43%
  • Veröffentlicht 03.11.2020 21:15:12
  • Zuletzt bearbeitet 21.11.2024 05:19:32

In BookStack before version 0.30.4, a user with permissions to edit a page could insert JavaScript code through the use of `javascript:` URIs within a link or form which would run, within the context of the current page, when clicked or submitted. Ad...

Exploit
  • EPSS 0.43%
  • Veröffentlicht 03.11.2020 19:15:13
  • Zuletzt bearbeitet 21.11.2024 05:19:31

In BookStack before version 0.30.4, a user with permissions to edit a page could add an attached link which would execute untrusted JavaScript code when clicked by a viewer of the page. Dangerous content may remain in the database after this update. ...

  • EPSS 0.39%
  • Veröffentlicht 07.05.2020 21:15:11
  • Zuletzt bearbeitet 21.11.2024 04:56:41

In BookStack greater than or equal to 0.18.0 and less than 0.29.2, there is an XSS vulnerability in comment creation. A user with permission to create comments could POST HTML directly to the system to be saved in a comment, which would then be execu...