This affects the package vis-timeline before 7.4.4. An attacker with the ability to control the items of a Timeline element can inject additional script code into the generated application.
References
Link | Resource |
---|---|
https://github.com/visjs/vis-timeline/issues/838 | Issue Tracking Third Party Advisory |
https://github.com/visjs/vis-timeline/pull/840 | Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBVISJS-1063502 | Exploit Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1063501 | Exploit Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-JS-VISTIMELINE-1063500 | Exploit Patch Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-01-22 18:15
Updated : 2021-02-02 14:58
NVD link : CVE-2020-28487
Mitre link : CVE-2020-28487
CVE.ORG link : CVE-2020-28487
JSON object : View
Products Affected
visjs
- vis-timeline
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')