Summary | Possible stored XSS at User profile header via Email |
---|---|
Advisory Release Date |
|
Product | Linchpin Intranet Suite Linchpin Essentials Linchpin User Profiles |
Affected Versions | Linchpin Intranet Suite 5.9.2 and all prior versions Linchpin Essentials 2.9.2 and all prior versions Linchpin User Profiles 3.9.3 and all prior versions |
Fixed Versions | Linchpin Intranet Suite 5.9.3 Linchpin Essentials 2.9.3 Linchpin User Profiles 3.9.4 |
🔍 Problem
This issue was discovered by Jafar Abo Nada via the Atlassian bug bounty program.
The researcher could identify that a user could possible insert XSS via the email of a user in the user profiles header.
Affected are the apps Linchpin Intranet Suite up to and including version 5.9.2, Linchpin Essentials up to and including version 2.9.2 and Linchpin User Profiles up to and including version 3.9.3.
❗️Severity
The vulnerability is rated as 8.7 according to CVSS. The score is calculated as CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N [8.7]
✅ Solution
For Linchpin Intranet Suite customers: Update to the latest Marketplace version: Linchpin Intranet Suite 5.9.3 or newer.
For Linchpin Essentials customers: Update to the latest Marketplace version: Linchpin Essentials 2.9.3 or newer.
For Linchpin User Profiles customers: Update to the latest Marketplace version: Linchpin User Profiles 3.9.4 or newer.
Should you be unable to update the Linchpin Intranet Suite to one of the listed versions, please reach out to our support team at https://seibert.biz/help.
Link to this page: https://seibert.biz/20240611cvecup2