http://open-source-security-software.net/project/MISP/cves.atomRecent CVEs for MISP2024-11-15T12:49:40.000479+00:00python-feedgenCVE-2023-24028MISP - CVE-2023-240282023-01-20T22:15:00+00:00In MISP 2.4.167, app/Controller/Component/ACLComponent.php has incorrect access control for the decaying import function.2023-01-20T22:15:00+00:00CVE-2023-24026MISP - CVE-2023-240262023-01-20T22:15:00+00:00In MISP 2.4.167, app/webroot/js/event-graph.js has an XSS vulnerability via an event-graph preview payload.2023-01-20T22:15:00+00:00CVE-2023-24027MISP - CVE-2023-240272023-01-20T22:15:00+00:00In MISP 2.4.167, app/webroot/js/action_table.js allows XSS via a network history name.2023-01-20T22:15:00+00:00CVE-2022-29530MISP - CVE-2022-295302022-04-20T23:15:00+00:00An issue was discovered in MISP before 2.4.158. There is stored XSS in the galaxy clusters.2022-04-20T23:15:00+00:00CVE-2022-29534MISP - CVE-2022-295342022-04-20T23:15:00+00:00An issue was discovered in MISP before 2.4.158. In UsersController.php, password confirmation can be bypassed via vectors involving an "Accept: application/json" header.2022-04-20T23:15:00+00:00CVE-2022-29529MISP - CVE-2022-295292022-04-20T23:15:00+00:00An issue was discovered in MISP before 2.4.158. There is stored XSS via the LinOTP login field.2022-04-20T23:15:00+00:00CVE-2022-29533MISP - CVE-2022-295332022-04-20T23:15:00+00:00An issue was discovered in MISP before 2.4.158. There is XSS in app/Controller/OrganisationsController.php in a situation with a "weird single checkbox page."2022-04-20T23:15:00+00:00CVE-2022-29528MISP - CVE-2022-295282022-04-20T23:15:00+00:00An issue was discovered in MISP before 2.4.158. PHAR deserialization can occur.2022-04-20T23:15:00+00:00CVE-2022-29531MISP - CVE-2022-295312022-04-20T23:15:00+00:00An issue was discovered in MISP before 2.4.158. There is stored XSS in the event graph via a tag name.2022-04-20T23:15:00+00:00CVE-2022-29532MISP - CVE-2022-295322022-04-20T23:15:00+00:00An issue was discovered in MISP before 2.4.158. There is XSS in the cerebrate view if one administrator puts a javascript: URL in the URL field, and another administrator clicks on it.2022-04-20T23:15:00+00:00CVE-2022-27243MISP - CVE-2022-272432022-03-18T18:15:00+00:00An issue was discovered in MISP before 2.4.156. app/View/Users/terms.ctp allows Local File Inclusion via the custom terms file setting.2022-03-18T18:15:00+00:00CVE-2022-27244MISP - CVE-2022-272442022-03-18T18:15:00+00:00An issue was discovered in MISP before 2.4.156. A malicious site administrator could store an XSS payload in the custom auth name. This would be executed each time the administrator modifies a user.2022-03-18T18:15:00+00:00CVE-2022-27245MISP - CVE-2022-272452022-03-18T18:15:00+00:00An issue was discovered in MISP before 2.4.156. app/Model/Server.php does not restrict generateServerSettings to the CLI. This could lead to SSRF.2022-03-18T18:15:00+00:00CVE-2022-27246MISP - CVE-2022-272462022-03-18T18:15:00+00:00An issue was discovered in MISP before 2.4.156. An SVG org logo (which may contain JavaScript) is not forbidden by default.2022-03-18T18:15:00+00:00CVE-2021-41326MISP - CVE-2021-413262021-09-17T18:15:00+00:00In MISP before 2.4.148, app/Lib/Export/OpendataExport.php mishandles parameter data that is used in a shell_exec call.2021-09-17T18:15:00+00:00CVE-2021-39302MISP - CVE-2021-393022021-08-19T17:15:00+00:00MISP 2.4.148, in certain configurations, allows SQL injection via the app/Model/Log.php $conditions['org'] value.2021-08-19T17:15:00+00:00CVE-2021-37534MISP - CVE-2021-375342021-07-26T14:15:00+00:00app/View/GalaxyClusters/add.ctp in MISP 2.4.146 allows Stored XSS when forking a galaxy cluster.2021-07-26T14:15:00+00:00CVE-2021-37742MISP - CVE-2021-377422021-07-30T15:15:00+00:00app/View/Elements/GalaxyClusters/view_relation_tree.ctp in MISP 2.4.147 allows Stored XSS when viewing galaxy cluster relationships.2021-07-30T15:15:00+00:00CVE-2021-37743MISP - CVE-2021-377432021-07-30T15:15:00+00:00app/View/GalaxyElements/ajax/index.ctp in MISP 2.4.147 allows Stored XSS when viewing galaxy cluster elements in JSON format.2021-07-30T15:15:00+00:00CVE-2021-36212MISP - CVE-2021-362122021-07-07T13:15:00+00:00app/View/SharingGroups/view.ctp in MISP before 2.4.146 allows stored XSS in the sharing groups view.2021-07-07T13:15:00+00:00CVE-2021-35502MISP - CVE-2021-355022021-06-25T21:15:00+00:00app/View/Elements/genericElements/IndexTable/Fields/generic_field.ctp in MISP 2.4.144 does not sanitize certain data related to generic-template:index.2021-06-25T21:15:00+00:00CVE-2021-31780MISP - CVE-2021-317802021-04-23T20:15:00+00:00In app/Model/MispObject.php in MISP 2.4.141, an incorrect sharing group association could lead to information disclosure on an event edit. When an object has a sharing group associated with an event edit, the sharing group object is ignored and instead the passed local ID is reused.2021-04-23T20:15:00+00:00CVE-2021-27904MISP - CVE-2021-279042021-03-02T07:15:00+00:00An issue was discovered in app/Model/SharingGroupServer.php in MISP 2.4.139. In the implementation of Sharing Groups, the "all org" flag sometimes provided view access to unintended actors.2021-03-02T07:15:00+00:00CVE-2017-7215MISP - CVE-2017-72152017-03-21T19:59:00+00:00Cross site scripting in some view elements in the index filter tool in app/webroot/js/misp2.4.68.js and the organisation landing page in app/View/Organisations/ajax/landingpage.ctp of MISP before 2.4.69 allows remote attackers to inject arbitrary web script or HTML.2017-03-21T19:59:00+00:00CVE-2018-8949MISP - CVE-2018-89492018-03-23T17:29:00+00:00An issue was discovered in app/Model/Attribute.php in MISP before 2.4.89. There is a critical API integrity bug, potentially allowing users to delete attributes of other events. A crafted edit for an event (without attribute UUIDs but attribute IDs set) could overwrite an existing attribute.2018-03-23T17:29:00+00:00CVE-2018-8948MISP - CVE-2018-89482018-03-23T17:29:00+00:00In MISP before 2.4.89, app/View/Events/resolved_attributes.ctp has multiple XSS issues via a malicious MISP module.2018-03-23T17:29:00+00:00CVE-2018-11245MISP - CVE-2018-112452018-05-18T18:29:00+00:00app/webroot/js/misp.js in MISP 2.4.91 has a DOM based XSS with cortex type attributes.2018-05-18T18:29:00+00:00CVE-2017-16802MISP - CVE-2017-168022017-11-13T16:29:00+00:00In the sharingGroupPopulateOrganisations function in app/webroot/js/misp.js in MISP 2.4.82, there is XSS via a crafted organisation name that is manually added.2017-11-13T16:29:00+00:00CVE-2017-15216MISP - CVE-2017-152162017-10-10T18:29:00+00:00MISP before 2.4.81 has a potential reflected XSS in a quickDelete action that is used to delete a sighting, related to app/View/Sightings/ajax/quickDeleteConfirmationForm.ctp and app/webroot/js/misp.js.2017-10-10T18:29:00+00:00CVE-2017-14337MISP - CVE-2017-143372017-09-12T16:29:00+00:00When MISP before 2.4.80 is configured with X.509 certificate authentication (CertAuth) in conjunction with a non-MISP external user management ReST API, if an external user provides X.509 certificate authentication and this API returns an empty value, the unauthenticated user can be granted access as an arbitrary user.2017-09-12T16:29:00+00:00CVE-2020-24085MISP - CVE-2020-240852021-01-26T18:15:00+00:00A cross-site scripting (XSS) vulnerability exists in MISP v2.4.128 in app/Controller/UserSettingsController.php at SetHomePage() function. Due to a lack of controller validation in "path" parameter, an attacker can execute malicious JavaScript code.2021-01-26T18:15:00+00:00CVE-2021-25323MISP - CVE-2021-253232021-01-19T16:15:00+00:00The default setting of MISP 2.4.136 did not enable the requirements (aka require_password_confirmation) to provide the previous password when changing a password.2021-01-19T16:15:00+00:00CVE-2021-3184MISP - CVE-2021-31842021-01-19T16:15:00+00:00MISP 2.4.136 has XSS via a crafted URL to the app/View/Elements/global_menu.ctp user homepage favourite button.2021-01-19T16:15:00+00:00CVE-2021-25325MISP - CVE-2021-253252021-01-19T16:15:00+00:00MISP 2.4.136 has XSS via galaxy cluster element values to app/View/GalaxyElements/ajax/index.ctp. Reference types could contain javascript: URLs.2021-01-19T16:15:00+00:00CVE-2021-25324MISP - CVE-2021-253242021-01-19T16:15:00+00:00MISP 2.4.136 has Stored XSS in the galaxy cluster view via a cluster name to app/View/GalaxyClusters/view.ctp.2021-01-19T16:15:00+00:00CVE-2020-8893MISP - CVE-2020-88932020-02-12T00:15:00+00:00An issue was discovered in MISP before 2.4.121. The Galaxy view contained an incorrectly sanitized search string in app/View/Galaxies/view.ctp.2020-02-12T00:15:00+00:00CVE-2019-9482MISP - CVE-2019-94822019-03-01T05:29:00+00:00In MISP 2.4.102, an authenticated user can view sightings that they should not be eligible for. Exploiting this requires access to the event that has received the sighting. The issue affects instances with restrictive sighting settings (event only / sighting reported only).2019-03-01T05:29:00+00:00CVE-2020-8894MISP - CVE-2020-88942020-02-12T00:15:00+00:00An issue was discovered in MISP before 2.4.121. ACLs for discussion threads were mishandled in app/Controller/ThreadsController.php and app/Model/Thread.php.2020-02-12T00:15:00+00:00CVE-2018-6926MISP - CVE-2018-69262018-02-12T17:29:00+00:00In app/Controller/ServersController.php in MISP 2.4.87, a server setting permitted the override of a path variable on certain Red Hed Enterprise Linux and CentOS systems (where rh_shell_fix was enabled), and consequently allowed site admins to inject arbitrary OS commands. The impact is limited by the setting being only accessible to the site administrator.2018-02-12T17:29:00+00:00CVE-2020-8892MISP - CVE-2020-88922020-02-12T00:15:00+00:00An issue was discovered in MISP before 2.4.121. It did not consider the HTTP PUT method when trying to block a brute-force series of invalid requests.2020-02-12T00:15:00+00:00CVE-2020-8891MISP - CVE-2020-88912020-02-12T00:15:00+00:00An issue was discovered in MISP before 2.4.121. It did not canonicalize usernames when trying to block a brute-force series of invalid requests.2020-02-12T00:15:00+00:00CVE-2020-8890MISP - CVE-2020-88902020-02-12T00:15:00+00:00An issue was discovered in MISP before 2.4.121. It mishandled time skew (between the machine hosting the web server and the machine hosting the database) when trying to block a brute-force series of invalid requests.2020-02-12T00:15:00+00:00CVE-2019-19379MISP - CVE-2019-193792019-11-28T17:15:00+00:00In app/Controller/TagsController.php in MISP 2.4.118, users can bypass intended restrictions on tagging data.2019-11-28T17:15:00+00:00CVE-2018-19908MISP - CVE-2018-199082018-12-06T16:29:00+00:00An issue was discovered in MISP 2.4.9x before 2.4.99. In app/Model/Event.php (the STIX 1 import code), an unescaped filename string is used to construct a shell command. This vulnerability can be abused by a malicious authenticated user to execute arbitrary commands by tweaking the original filename of the STIX import.2018-12-06T16:29:00+00:00CVE-2020-29572MISP - CVE-2020-295722020-12-06T00:15:00+00:00app/View/Elements/genericElements/SingleViews/Fields/genericField.ctp in MISP 2.4.135 has XSS via the authkey comment field.2020-12-06T00:15:00+00:00CVE-2020-28947MISP - CVE-2020-289472020-11-19T18:15:00+00:00In MISP 2.4.134, XSS exists in the template element index view because the id parameter is mishandled.2020-11-19T18:15:00+00:00CVE-2020-28043MISP - CVE-2020-280432020-11-02T21:15:00+00:00MISP through 2.4.133 allows SSRF in the REST client via the use_full_path parameter with an arbitrary URL.2020-11-02T21:15:00+00:00CVE-2019-16202MISP - CVE-2019-162022019-09-10T14:15:00+00:00MISP before 2.4.115 allows privilege escalation in certain situations. After updating to 2.4.115, escalation attempts are blocked by the __checkLoggedActions function with a "This could be an indication of an attempted privilege escalation on older vulnerable versions of MISP (<2.4.115)" message.2019-09-10T14:15:00+00:00CVE-2019-14286MISP - CVE-2019-142862019-07-27T18:15:00+00:00In app/webroot/js/event-graph.js in MISP 2.4.111, a stored XSS vulnerability exists in the event-graph view when a user toggles the event graph view. A malicious MISP event must be crafted in order to trigger the vulnerability.2019-07-27T18:15:00+00:00CVE-2020-29006MISP - CVE-2020-290062020-11-24T15:15:00+00:00MISP before 2.4.135 lacks an ACL check, related to app/Controller/GalaxyElementsController.php and app/Model/GalaxyElement.php.2020-11-24T15:15:00+00:00CVE-2020-25766MISP - CVE-2020-257662020-09-18T18:15:00+00:00An issue was discovered in MISP before 2.4.132. It can perform an unwanted action because of a POST operation on a form that is not linked to the login page.2020-09-18T18:15:00+00:00CVE-2020-15412MISP - CVE-2020-154122020-06-30T14:15:00+00:00An issue was discovered in MISP 2.4.128. app/Controller/EventsController.php lacks an event ACL check before proceeding to allow a user to send an event contact form.2020-06-30T14:15:00+00:00CVE-2018-12649MISP - CVE-2018-126492018-06-22T14:29:00+00:00An issue was discovered in app/Controller/UsersController.php in MISP 2.4.92. An adversary can bypass the brute-force protection by using a PUT HTTP method instead of a POST HTTP method in the login part, because this protection was only covering POST requests.2018-06-22T14:29:00+00:00CVE-2020-15711MISP - CVE-2020-157112020-07-14T13:15:00+00:00In MISP before 2.4.129, setting a favourite homepage was not CSRF protected.2020-07-14T13:15:00+00:00CVE-2020-15411MISP - CVE-2020-154112020-06-30T14:15:00+00:00An issue was discovered in MISP 2.4.128. app/Controller/AttributesController.php has insufficient ACL checks in the attachment downloader.2020-06-30T14:15:00+00:00CVE-2018-11562MISP - CVE-2018-115622018-05-30T20:29:00+00:00An issue was discovered in MISP 2.4.91. A vulnerability in app/View/Elements/eventattribute.ctp allows reflected XSS if a user clicks on a malicious link for an event view and then clicks on the deleted attributes quick filter.2018-05-30T20:29:00+00:00CVE-2020-14969MISP - CVE-2020-149692020-06-22T12:15:00+00:00app/Model/Attribute.php in MISP 2.4.127 lacks an ACL lookup on attribute correlations. This occurs when querying the attribute restsearch API, revealing metadata about a correlating but unreachable attribute.2020-06-22T12:15:00+00:00CVE-2017-16946MISP - CVE-2017-169462017-11-25T18:29:00+00:00The admin_edit function in app/Controller/UsersController.php in MISP 2.4.82 mishandles the enable_password field, which allows admins to discover a hashed password by reading the audit log.2017-11-25T18:29:00+00:00CVE-2019-12868MISP - CVE-2019-128682019-06-18T00:15:00+00:00app/Model/Server.php in MISP 2.4.109 allows remote command execution by a super administrator because the PHP file_exists function is used with user-controlled entries, and phar:// URLs trigger deserialization.2019-06-18T00:15:00+00:00CVE-2019-12794MISP - CVE-2019-127942019-06-11T17:29:00+00:00An issue was discovered in MISP 2.4.108. Organization admins could reset credentials for site admins (organization admins have the inherent ability to reset passwords for all of their organization's users). This, however, could be abused in a situation where the host organization of an instance creates organization admins. An organization admin could set a password manually for the site admin or simply use the API key of the site admin to impersonate them. The potential for abuse only occurs when the host organization creates lower-privilege organization admins instead of the usual site admins. Also, only organization admins of the same organization as the site admin could abuse this.2019-06-11T17:29:00+00:00CVE-2020-12889MISP - CVE-2020-128892020-05-15T18:15:00+00:00MISP MISP-maltego 1.4.4 incorrectly shares a MISP connection across users in a remote-transform use case.2020-05-15T18:15:00+00:00CVE-2019-11814MISP - CVE-2019-118142019-05-08T13:29:00+00:00An issue was discovered in app/webroot/js/misp.js in MISP before 2.4.107. There is persistent XSS via image names in titles, as demonstrated by a screenshot.2019-05-08T13:29:00+00:00CVE-2019-11812MISP - CVE-2019-118122019-05-08T13:29:00+00:00A persistent XSS issue was discovered in app/View/Helper/CommandHelper.php in MISP before 2.4.107. JavaScript can be included in the discussion interface, and can be triggered by clicking on the link.2019-05-08T13:29:00+00:00CVE-2019-11813MISP - CVE-2019-118132019-05-08T13:29:00+00:00An issue was discovered in app/View/Elements/Events/View/value_field.ctp in MISP before 2.4.107. There is persistent XSS via link type attributes with javascript:// links.2019-05-08T13:29:00+00:00CVE-2020-13153MISP - CVE-2020-131532020-05-18T22:15:00+00:00app/View/Events/resolved_attributes.ctp in MISP before 2.4.126 has XSS in the resolved attributes view.2020-05-18T22:15:00+00:00CVE-2017-13671MISP - CVE-2017-136712017-08-24T19:29:00+00:00app/View/Helper/CommandHelper.php in MISP before 2.4.79 has persistent XSS via comments. It only impacts the users of the same instance because the comment field is not part of the MISP synchronisation.2017-08-24T19:29:00+00:00CVE-2020-11458MISP - CVE-2020-114582020-04-02T12:15:00+00:00app/Model/feed.php in MISP before 2.4.124 allows administrators to choose arbitrary files that should be ingested by MISP. This does not cause a leak of the full contents of a file, but does cause a leaks of strings that match certain patterns. Among the data that can leak are passwords from database.php or GPG key passphrases from config.php.2020-04-02T12:15:00+00:00CVE-2020-10246MISP - CVE-2020-102462020-03-09T19:15:00+00:00MISP 2.4.122 has reflected XSS via unsanitized URL parameters. This is related to app/View/Users/statistics_orgs.ctp.2020-03-09T19:15:00+00:00CVE-2019-16202MISP - CVE-2019-162022019-09-10T10:15:10.663000+00:00MISP before 2.4.115 allows privilege escalation in certain situations. After updating to 2.4.115, escalation attempts are blocked by the __checkLoggedActions function with a "This could be an indication of an attempted privilege escalation on older vulnerable versions of MISP (<2.4.115)" message.2019-09-10T10:15:10.663000+00:00CVE-2019-14286MISP - CVE-2019-142862019-07-27T14:15:12.120000+00:00In app/webroot/js/event-graph.js in MISP 2.4.111, a stored XSS vulnerability exists in the event-graph view when a user toggles the event graph view. A malicious MISP event must be crafted in order to trigger the vulnerability.2019-07-27T14:15:12.120000+00:00CVE-2019-12868MISP - CVE-2019-128682019-06-17T20:15:09.317000+00:00app/Model/Server.php in MISP 2.4.109 allows remote command execution by a super administrator because the PHP file_exists function is used with user-controlled entries, and phar:// URLs trigger deserialization.2019-06-17T20:15:09.317000+00:00CVE-2019-12794MISP - CVE-2019-127942019-06-11T13:29:00.550000+00:00An issue was discovered in MISP 2.4.108. Organization admins could reset credentials for site admins (organization admins have the inherent ability to reset passwords for all of their organization's users). This, however, could be abused in a situation where the host organization of an instance creates organization admins. An organization admin could set a password manually for the site admin or simply use the API key of the site admin to impersonate them. The potential for abuse only occurs when the host organization creates lower-privilege organization admins instead of the usual site admins. Also, only organization admins of the same organization as the site admin could abuse this.2019-06-11T13:29:00.550000+00:00CVE-2019-11812MISP - CVE-2019-118122019-05-08T09:29:00.253000+00:00A persistent XSS issue was discovered in app/View/Helper/CommandHelper.php in MISP before 2.4.107. JavaScript can be included in the discussion interface, and can be triggered by clicking on the link.2019-05-08T09:29:00.253000+00:00CVE-2019-11813MISP - CVE-2019-118132019-05-08T09:29:00.440000+00:00An issue was discovered in app/View/Elements/Events/View/value_field.ctp in MISP before 2.4.107. There is persistent XSS via link type attributes with javascript:// links.2019-05-08T09:29:00.440000+00:00CVE-2019-11814MISP - CVE-2019-118142019-05-08T09:29:00.487000+00:00An issue was discovered in app/webroot/js/misp.js in MISP before 2.4.107. There is persistent XSS via image names in titles, as demonstrated by a screenshot.2019-05-08T09:29:00.487000+00:00CVE-2019-10254MISP - CVE-2019-102542019-03-28T11:29:00.387000+00:00In MISP before 2.4.105, the app/View/Layouts/default.ctp default layout template has a Reflected XSS vulnerability.2019-03-28T11:29:00.387000+00:00CVE-2018-19908MISP - CVE-2018-199082018-12-06T11:29:00.290000+00:00An issue was discovered in MISP 2.4.9x before 2.4.99. In app/Model/Event.php (the STIX 1 import code), an unescaped filename string is used to construct a shell command. This vulnerability can be abused by a malicious authenticated user to execute arbitrary commands by tweaking the original filename of the STIX import.2018-12-06T11:29:00.290000+00:00CVE-2019-9482MISP - CVE-2019-94822019-03-01T00:29:00.790000+00:00In MISP 2.4.102, an authenticated user can view sightings that they should not be eligible for. Exploiting this requires access to the event that has received the sighting. The issue affects instances with restrictive sighting settings (event only / sighting reported only).2019-03-01T00:29:00.790000+00:00CVE-2019-10254MISP - CVE-2019-102542019-03-28T15:29:00+00:00In MISP before 2.4.105, the app/View/Layouts/default.ctp default layout template has a Reflected XSS vulnerability.2019-03-28T15:29:00+00:00CVE-2020-10247MISP - CVE-2020-102472020-03-09T19:15:00+00:00MISP 2.4.122 has Persistent XSS in the sighting popover tool. This is related to app/View/Elements/Events/View/sighting_field.ctp.2020-03-09T19:15:00+00:00CVE-2018-12649MISP - CVE-2018-126492018-06-22T10:29:00.310000+00:00An issue was discovered in app/Controller/UsersController.php in MISP 2.4.92. An adversary can bypass the brute-force protection by using a PUT HTTP method instead of a POST HTTP method in the login part, because this protection was only covering POST requests.2018-06-22T10:29:00.310000+00:00CVE-2018-11562MISP - CVE-2018-115622018-05-30T16:29:00.313000+00:00An issue was discovered in MISP 2.4.91. A vulnerability in app/View/Elements/eventattribute.ctp allows reflected XSS if a user clicks on a malicious link for an event view and then clicks on the deleted attributes quick filter.2018-05-30T16:29:00.313000+00:00CVE-2018-11245MISP - CVE-2018-112452018-05-18T14:29:00.280000+00:00app/webroot/js/misp.js in MISP 2.4.91 has a DOM based XSS with cortex type attributes.2018-05-18T14:29:00.280000+00:00CVE-2018-6926MISP - CVE-2018-69262018-02-12T12:29:00.323000+00:00In app/Controller/ServersController.php in MISP 2.4.87, a server setting permitted the override of a path variable on certain Red Hed Enterprise Linux and CentOS systems (where rh_shell_fix was enabled), and consequently allowed site admins to inject arbitrary OS commands. The impact is limited by the setting being only accessible to the site administrator.2018-02-12T12:29:00.323000+00:00CVE-2017-7215MISP - CVE-2017-72152017-03-21T15:59:00.173000+00:00Cross site scripting in some view elements in the index filter tool in app/webroot/js/misp2.4.68.js and the organisation landing page in app/View/Organisations/ajax/landingpage.ctp of MISP before 2.4.69 allows remote attackers to inject arbitrary web script or HTML.2017-03-21T15:59:00.173000+00:00CVE-2017-14337MISP - CVE-2017-143372017-09-12T12:29:00.177000+00:00When MISP before 2.4.80 is configured with X.509 certificate authentication (CertAuth) in conjunction with a non-MISP external user management ReST API, if an external user provides X.509 certificate authentication and this API returns an empty value, the unauthenticated user can be granted access as an arbitrary user.2017-09-12T12:29:00.177000+00:00CVE-2017-15216MISP - CVE-2017-152162017-10-10T14:29:00.243000+00:00MISP before 2.4.81 has a potential reflected XSS in a quickDelete action that is used to delete a sighting, related to app/View/Sightings/ajax/quickDeleteConfirmationForm.ctp and app/webroot/js/misp.js.2017-10-10T14:29:00.243000+00:00CVE-2017-16802MISP - CVE-2017-168022017-11-13T11:29:00.263000+00:00In the sharingGroupPopulateOrganisations function in app/webroot/js/misp.js in MISP 2.4.82, there is XSS via a crafted organisation name that is manually added.2017-11-13T11:29:00.263000+00:00CVE-2017-13671MISP - CVE-2017-136712017-08-24T15:29:00.250000+00:00app/View/Helper/CommandHelper.php in MISP before 2.4.79 has persistent XSS via comments. It only impacts the users of the same instance because the comment field is not part of the MISP synchronisation.2017-08-24T15:29:00.250000+00:00CVE-2017-16946MISP - CVE-2017-169462017-11-25T13:29:00.220000+00:00The admin_edit function in app/Controller/UsersController.php in MISP 2.4.82 mishandles the enable_password field, which allows admins to discover a hashed password by reading the audit log.2017-11-25T13:29:00.220000+00:00