CVE-2021-28079
MEDIUMjamovi <= 1.6.18 - Stored Cross-Site Scripting via Column Name in .omv File
Title source: llmExploitation Summary
EIP tracks 1 public exploit for CVE-2021-28079. PoCs published by g33xter.
AI-analyzed exploit summary This repository provides a functional proof-of-concept for CVE-2021-28079, an XSS vulnerability in Jamovi <=1.6.18. The exploit involves crafting a malicious .omv file with an XSS payload in the metadata.json file, which executes when opened by the victim.
Description
Jamovi <=1.6.18 is affected by a cross-site scripting (XSS) vulnerability. The column-name is vulnerable to XSS in the ElectronJS Framework. An attacker can make a .omv (Jamovi) document containing a payload. When opened by victim, the payload is triggered.
Exploits (1)
This repository provides a functional proof-of-concept for CVE-2021-28079, an XSS vulnerability in Jamovi <=1.6.18. The exploit involves crafting a malicious .omv file with an XSS payload in the metadata.json file, which executes when opened by the victim.
References (2)
Scores
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N