6.1
CVSSv3

CVE-2021-28079

Published: 26/04/2021 Updated: 30/04/2021
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.1 | Impact Score: 2.7 | Exploitability Score: 2.8
VMScore: 384
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Jamovi <=1.6.18 is affected by a cross-site scripting (XSS) vulnerability. The column-name is vulnerable to XSS in the ElectronJS Framework. An attacker can make a .omv (Jamovi) document containing a payload. When opened by victim, the payload is triggered.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

Github Repositories

POC Jamovi <=1.6.18 is affected by a cross-site scripting (XSS) vulnerability. The column-name is vulnerable to XSS in the ElectronJS Framework. An attacker can make a .omv (Jamovi) document containing a payload. When opened by victim, the payload is triggered.

CVE-2021-28079 - POC Jamovi &lt;=1618 is affected by a cross-site scripting (XSS) vulnerability The column-name is vulnerable to XSS in the ElectronJS Framework An attacker can make a omv (Jamovi) document containing a payload When opened by victim, the payload is triggered 🔥\&gt; file exampleomv exampleomv: Zip archive data, at least v20 to extract

CVE's we discovered along the way

cves CVE's we discovered along the way CVE-2020-12772 An NTLM hash leak in the Spark XMPP client and ROAR Module CVE-2020-24364 An injection/remote code executiuon in MineTime CVE-2021-28079 Jamovi &lt;=1618 is affected by a cross-site scripting (XSS) vulnerability @theart42 &amp; @4nqr34z @theart42 &amp; @4nqr34z