Miggo Logo

GHSA-25v4-mcx4-hh35: Cross-Site Scripting in atlasboard-atlassian-package

N/A

CVSS Score

Basic Information

CVE ID
-
EPSS Score
-
Published
9/4/2020
Updated
1/9/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
atlasboard-atlassian-packagenpm>= 0.0.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The advisory explicitly states the root cause is failure to sanitize user input rendered as HTML, but no specific functions or file paths are disclosed in available sources. While the vulnerability clearly exists in the Jira issue summary rendering logic, the lack of accessible source code, commit diffs, or patch details makes it impossible to identify exact function names and locations with high confidence. The XSS likely occurs wherever user-controlled issue summaries are inserted into DOM without proper escaping, but this cannot be mapped to specific functions without implementation details.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*ll v*rsions o* `*tl*s*o*r*-*tl*ssi*n-p**k***` prior to *.*.* *r* vuln*r**l* to *ross-Sit* S*riptin* (XSS). T** p**k*** **ils to prop*rly s*nitiz* us*r input t**t is r*n**r** *s *TML, w*i** m*y *llow *tt**k*rs to *x**ut* *r*itr*ry J*v*S*ript in * vi

Reasoning

T** **visory *xpli*itly st*t*s t** root **us* is **ilur* to s*nitiz* us*r input r*n**r** *s *TML, *ut no sp**i*i* *un*tions or *il* p*t*s *r* *is*los** in *v*il**l* sour**s. W*il* t** vuln*r**ility *l**rly *xists in t** `Jir*` issu* summ*ry r*n**rin*