Summary | Possible stored XSS in profile field "confluence.im" |
---|---|
Advisory Release Date |
|
Product | Linchpin User Profiles Linchpin Intranet Suite Linchpin Essentials |
Affected Versions | Linchpin User Profiles all versions starting 3.0.0 until 3.10.0 Linchpin Intranet Suite all versions starting 5.0.0 until 5.10.1 Linchpin Essentials all versions starting 2.0.0 until 2.10.0 |
Fixed Versions | Linchpin User Profiles 3.10.1 Linchpin Intranet Suite 5.10.2 Linchpin Essentials 2.10.1 |
Problem
This issue was discovered via the Atlassian bug bounty program.
The researcher could identify that a user could possibly insert XSS via the "confluence.im" profile field which was then executed in the People Directory and People Search & List Macro.
Affected are the apps Linchpin User Profile from version 3.0.0 up to and including 3.10, Linchpin Intranet Suite from version 5.0.0 up to and including 5.10.1 and Linchpin Essentials from version 2.0.0 up to and including 2.10.0.
Severity
The vulnerability is rated as 8.7 according to CVSS. The score is calculated as CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N [8.7]
Solution
For Linchpin User Profiles customers: Update to the latest Marketplace version: Linchpin User Profiles 3.10.1 or newer.
For Linchpin Intranet Suite customers: Update to the latest Marketplace version: Linchpin Intranet Suite 5.10.2 or newer.
For Linchpin Essentials customers: Update to the latest Marketplace version: Linchpin Essentials 2.10.1 or newer.
Should you be unable to update the Linchpin Intranet Suite to one of the listed versions, please reach out to our support team at https://seibert.biz/help.
Link to this page: https://seibert.biz/20240911cvecup