WESEEK GROWI 1.6.2

CPE Details

WESEEK GROWI 1.6.2
1.6.2
2019-05-10
16h27 +00:00
2019-05-10
16h27 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:weseek:growi:1.6.2:*:*:*:*:*:*:*

Informations

Vendor

weseek

Product

growi

Version

1.6.2

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2023-42436 2023-12-26 07h22 +00:00 Stored cross-site scripting vulnerability exists in the presentation feature of GROWI versions prior to v3.4.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product.
5.4
Moyen
CVE-2023-50332 2023-12-26 07h21 +00:00 Improper authorization vulnerability exists in the User Management (/admin/users) page of GROWI versions prior to v6.0.6. If this vulnerability is exploited, a user may delete or suspend its own account without the user's intention.
6.5
Moyen
CVE-2023-50294 2023-12-26 07h21 +00:00 The App Settings (/admin/app) page in GROWI versions prior to v6.0.6 stores sensitive information in cleartext form. As a result, the Secret access key for external service may be obtained by an attacker who can access the App Settings page.
6.5
Moyen
CVE-2023-50175 2023-12-26 07h21 +00:00 Stored cross-site scripting vulnerability exists in the App Settings (/admin/app) page, the Markdown Settings (/admin/markdown) page, and the Customize (/admin/customize) page of GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product.
5.4
Moyen
CVE-2023-49807 2023-12-26 07h21 +00:00 Stored cross-site scripting vulnerability when processing the MathJax exists in GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product.
5.4
Moyen
CVE-2023-49779 2023-12-26 07h21 +00:00 Stored cross-site scripting vulnerability exists in the anchor tag of GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product.
5.4
Moyen
CVE-2023-49598 2023-12-26 07h21 +00:00 Stored cross-site scripting vulnerability exists in the event handlers of the pre tags in GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product.
5.4
Moyen
CVE-2023-49119 2023-12-26 07h20 +00:00 Stored cross-site scripting vulnerability via the img tags exists in GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product.
5.4
Moyen
CVE-2023-47215 2023-12-26 07h20 +00:00 Stored cross-site scripting vulnerability which is exploiting a behavior of the XSS Filter exists in GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product.
5.4
Moyen
CVE-2023-46699 2023-12-26 07h20 +00:00 Cross-site request forgery (CSRF) vulnerability exists in the User settings (/me) page of GROWI versions prior to v6.0.0. If a user views a malicious page while logging in, settings may be changed without the user's intention.
4.3
Moyen
CVE-2023-45740 2023-12-26 07h20 +00:00 Stored cross-site scripting vulnerability when processing profile images exists in GROWI versions prior to v4.1.3. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product.
5.4
Moyen
CVE-2023-45737 2023-12-26 07h20 +00:00 Stored cross-site scripting vulnerability exists in the App Settings (/admin/app) page and the Markdown Settings (/admin/markdown) page of GROWI versions prior to v3.5.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product.
5.4
Moyen
CVE-2023-50339 2023-12-26 07h20 +00:00 Stored cross-site scripting vulnerability exists in the User Management (/admin/users) page of GROWI versions prior to v6.1.11. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product.
5.4
Moyen
CVE-2022-1236 2022-04-05 06h25 +00:00 Weak Password Requirements in GitHub repository weseek/growi prior to v5.0.0.
6.5
Moyen
CVE-2021-3852 2022-01-12 09h15 +00:00 growi is vulnerable to Authorization Bypass Through User-Controlled Key
7.5
Haute
CVE-2021-20829 2021-09-21 07h25 +00:00 Cross-site scripting vulnerability due to the inadequate tag sanitization in GROWI versions v4.2.19 and earlier allows remote attackers to execute an arbitrary script on the web browser of the user who accesses a specially crafted page.
6.1
Moyen
CVE-2021-20737 2021-06-21 23h35 +00:00 Improper authentication vulnerability in GROWI versions prior to v4.2.20 allows a remote attacker to view the unauthorized pages without access privileges via unspecified vectors.
6.5
Moyen
CVE-2021-20736 2021-06-21 23h35 +00:00 NoSQL injection vulnerability in GROWI versions prior to v4.2.20 allows a remote attacker to obtain and/or alter the information stored in the database via unspecified vectors.
9.1
Critique
CVE-2021-20670 2021-03-10 08h20 +00:00 Improper access control vulnerability in GROWI versions v4.2.2 and earlier allows a remote unauthenticated attacker to read the user's personal information and/or server's internal information via unspecified vectors.
7.5
Haute
CVE-2021-20669 2021-03-10 08h20 +00:00 Path traversal vulnerability in GROWI versions v4.2.2 and earlier allows an attacker with administrator rights to read and/or delete an arbitrary path via a specially crafted URL.
4.7
Moyen
CVE-2021-20667 2021-03-10 08h20 +00:00 Stored cross-site scripting vulnerability due to inadequate CSP (Content Security Policy) configuration in GROWI versions v4.2.2 and earlier allows remote authenticated attackers to inject an arbitrary script via a specially crafted content.
5.4
Moyen
CVE-2021-20668 2021-03-10 08h20 +00:00 Path traversal vulnerability in GROWI versions v4.2.2 and earlier allows an attacker with administrator rights to read an arbitrary path via a specially crafted URL.
2.7
Bas
CVE-2020-5683 2020-12-16 06h45 +00:00 Directory traversal vulnerability in GROWI versions prior to v4.2.3 (v4.2 Series), GROWI versions prior to v4.1.12 (v4.1 Series), and GROWI v3 series and earlier GROWI versions prior to v4.2.3 (v4.2 Series), GROWI versions prior to v4.1.12 (v4.1 Series), and GROWI v3 series and earlier allows remote attackers to alter the data by uploading a specially crafted file.
7.5
Haute
CVE-2020-5682 2020-12-16 06h45 +00:00 Improper input validation in GROWI versions prior to v4.2.3 (v4.2 Series), GROWI versions prior to v4.1.12 (v4.1 Series), and GROWI v3 series and earlier GROWI versions prior to v4.2.3 (v4.2 Series), GROWI versions prior to v4.1.12 (v4.1 Series), and GROWI v3 series and earlier allows remote attackers to cause a denial of service via unspecified vectors.
7.5
Haute
CVE-2020-5677 2020-12-03 10h15 +00:00 Reflected cross-site scripting vulnerability in GROWI v4.0.0 and earlier allows remote attackers to inject arbitrary script via unspecified vectors.
6.1
Moyen
CVE-2020-5678 2020-12-03 10h15 +00:00 Stored cross-site scripting vulnerability in GROWI v3.8.1 and earlier allows remote attackers to inject arbitrary script via unspecified vectors.
6.1
Moyen
CVE-2020-5676 2020-12-03 10h15 +00:00 GROWI v4.1.3 and earlier allow remote attackers to obtain information which is not allowed to access via unspecified vectors.
7.5
Haute
CVE-2019-13337 2019-07-09 17h28 +00:00 In WESEEK GROWI before 3.5.0, the site-wide basic authentication can be bypassed by adding a URL parameter access_token (this is the parameter used by the API). No valid token is required since it is not validated by the backend. The website can then be browsed as if no basic authentication is required.
7.5
Haute
CVE-2019-13338 2019-07-09 17h27 +00:00 In WESEEK GROWI before 3.5.0, a remote attacker can obtain the password hash of the creator of a page by leveraging wiki access to make API calls for page metadata. In other words, the password hash can be retrieved even though it is not a publicly available field.
7.5
Haute
CVE-2019-5968 2019-07-05 11h20 +00:00 Cross-site request forgery (CSRF) vulnerability in GROWI v3.4.6 and earlier allows remote attackers to hijack the authentication of administrators via updating user's 'Basic Info'.
8.8
Haute
CVE-2019-5969 2019-07-05 11h20 +00:00 Open redirect vulnerability in GROWI v3.4.6 and earlier allows remote attackersto redirect users to arbitrary web sites and conduct phishing attacks via the process of login.
6.1
Moyen
CVE-2018-0698 2019-01-09 21h00 +00:00 Cross-site scripting vulnerability in GROWI v3.2.3 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
5.4
Moyen
CVE-2018-16205 2019-01-09 21h00 +00:00 Cross-site scripting vulnerability in GROWI v3.2.3 and earlier allows remote attackers to inject arbitrary web script or HTML via New Page modal.
5.4
Moyen
CVE-2018-0652 2018-09-07 12h00 +00:00 Cross-site scripting vulnerability in GROWI v.3.1.11 and earlier allows remote authenticated attackers to inject arbitrary web script or HTML via the UserGroup Management section of admin page.
4.8
Moyen
CVE-2018-0653 2018-09-07 12h00 +00:00 Cross-site scripting vulnerability in GROWI v.3.1.11 and earlier allows remote attackers to inject arbitrary web script or HTML via Wiki page view.
6.1
Moyen
CVE-2018-0654 2018-09-07 12h00 +00:00 Cross-site scripting vulnerability in GROWI v.3.1.11 and earlier allows remote attackers to inject arbitrary web script or HTML via the modal for creating Wiki page.
6.1
Moyen
CVE-2018-0655 2018-09-07 12h00 +00:00 Cross-site scripting vulnerability in GROWI v.3.1.11 and earlier allows remote authenticated attackers to inject arbitrary web script or HTML via the app settings section of admin page.
4.8
Moyen