- Description
- grist-core is a spreadsheet hosting server. A user visiting a malicious document and clicking on a link in a HyperLink cell using a control modifier (meaning for example Ctrl+click) could have their account compromised, since the link could use the javascript: scheme and be evaluated in the context of their current page. This issue has been patched in version 1.3.2. Users are advised to upgrade. Users unable to upgrade should avoid clicking on HyperLink cell links using a control modifier in documents prepared by people they do not trust.
- Source
- security-advisories@github.com
- NVD status
- Received
CVSS 3.1
- Type
- Secondary
- Base score
- 8.1
- Impact score
- 5.2
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
- Severity
- HIGH
- security-advisories@github.com
- CWE-79
- Hype score
- Not currently trending
CVE-2024-56359 Account Compromise via HyperLink Exploit in Grist-core Prior to 1.3.2 grist-core is a service for hosting spreadsheets. There is an issue when a user clicks a link in a HyperLink cell with a contro... https://t.co/oh9oHlJZAS
@VulmonFeeds
20 Dec 2024
6 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-56359 grist-core is a spreadsheet hosting server. A user visiting a malicious document and clicking on a link in a HyperLink cell using a control modifier (meaning for exam… https://t.co/Lpt4JXwaEe
@CVEnew
20 Dec 2024
377 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes