CVE-2023-49289:
Ajax Pro Cross-site Scripting
6.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.56654%
CWE
Published
12/5/2023
Updated
12/5/2023
KEV Status
No
Technology
C#
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
AjaxNetProfessional | nuget | < 21.12.22.1 | 21.12.22.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from unsafe JSON deserialization in core.js
's parse()
function. The commit fix shows: 1) Removal of ISO date handling that could be manipulated 2) Narrowing the regex from .*? (greedy match) to \d+ (strict numeric match) for Date()
parameters 3) Removal of complex date parsing logic that could bypass sanitization. These changes directly address XSS by preventing injection of malicious objects through date fields. The eval()
call with insufficient input validation made this function particularly dangerous for untrusted data deserialization.