CVE-2024-27609: Bonita cross-site scripting vulnerability
6.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.14395%
CWE
Published
4/1/2024
Updated
11/8/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.bonitasoft.console:bonita-web-server | maven | < 10.1.0.W11 | 10.1.0.W11 |
org.bonitasoft.platform:platform-resources | maven | < 10.1.0.W11 | 10.1.0.W11 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability arises from the absence of input sanitization in specific API endpoints handling user input in the administration panel. The provided data primarily shows the fix (adding the SanitizerFilter and enabling it via configuration) but does not explicitly identify the exact pre-patch functions responsible for processing user input without sanitization. The core issue is the lack of sanitization in vulnerable versions, but the specific functions in the affected packages (bonita-web-server and platform-resources) that directly handle the unsanitized input are not named in the provided code diffs or descriptions. Thus, no functions can be confidently identified with high certainty based on the available information.