PT-2023-27901 · Tolgee · Tolgee
Mbiesiad
·
Published
2023-09-07
·
Updated
2023-09-13
·
CVE-2023-41316
Mbiesiad
·
Published
2023-09-07
·
Updated
2023-09-13
·
CVE-2023-41316
5.5
Medium
Base vector | Vector | AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L |
Name of the Vulnerable Software and Affected Versions:
Tolgee versions prior to 3.29.2
Description:
Tolgee is an open-source localization platform. Due to a lack of validation in the `Org Name` field, a bad actor can send emails with HTML injected code to victims. Registered users can inject HTML into unsanitized emails from the Tolgee instance to other users, which ends up in invitation emails appearing as legitimate org invitations. Bad actors may direct users to a malicious website or execute JavaScript in the context of the user's browser.
Recommendations:
For versions prior to 3.29.2, upgrade to version 3.29.2 to address the vulnerability. As a temporary workaround, consider restricting the use of the `Org Name` field until the upgrade is applied. Avoid using the `Org Name` field in a way that could allow HTML injection until the issue is resolved.
Exploit
Fix
RCE
XSS