Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in Koha 3.14.x before 3.14.16, 3.16.x before 3.16.12, 3.18.x before 3.18.08, and 3.20.x before 3.20.1 allow remote attackers to inject arbitrary web script or HTML via the (1) tag parameter to opac-search.pl; the (2) value parameter to authorities/authorities-home.pl; the (3) delay parameter to acqui/lateorders.pl; the (4) authtypecode or (5) tagfield to admin/auth_subfields_structure.pl; the (6) tagfield parameter to admin/marc_subfields_structure.pl; the (7) limit parameter to catalogue/search.pl; the (8) bookseller_filter, (9) callnumber_filter, (10) EAN_filter, (11) ISSN_filter, (12) publisher_filter, or (13) title_filter parameter to serials/serials-search.pl; or the (14) author, (15) collectiontitle, (16) copyrightdate, (17) isbn, (18) manageddate_from, (19) manageddate_to, (20) publishercode, (21) suggesteddate_from, or (22) suggesteddate_to parameter to suggestion/suggestion.pl; or the (23) direction, (24) display or (25) addshelf parameter to opac-shelves.pl.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Koha | Koha | >= 3.14.00, < 3.14.16 |
Related Weaknesses (CWE)
References
- https://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=14416ExploitIssue TrackingVendor Advisory
- https://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=14418ExploitIssue TrackingVendor Advisory
- https://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=14423ExploitIssue Tracking
- https://koha-community.org/koha-3-14-16-released/ProductRelease NotesVendor Advisory
- https://koha-community.org/security-release-koha-3-16-12/ProductRelease NotesVendor Advisory
- https://koha-community.org/security-release-koha-3-18-8/ProductRelease NotesVendor Advisory
- https://koha-community.org/security-release-koha-3-20-1/ProductRelease NotesVendor Advisory
- https://packetstormsecurity.com/files/132458/Koha-ILS-3.20.x-CSRF-XSS-Traversal-ExploitThird Party AdvisoryVDB Entry
- https://seclists.org/fulldisclosure/2015/Jun/80ExploitMailing ListThird Party Advisory
- https://www.exploit-db.com/exploits/37389/ExploitThird Party AdvisoryVDB Entry
- https://www.sba-research.org/2015/06/24/researchers-of-sba-research-found-severaThird Party Advisory
- https://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=14416ExploitIssue TrackingVendor Advisory
- https://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=14418ExploitIssue TrackingVendor Advisory
- https://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=14423ExploitIssue Tracking
- https://koha-community.org/koha-3-14-16-released/ProductRelease NotesVendor Advisory
FAQ
What is CVE-2015-4631?
CVE-2015-4631 is a vulnerability with a CVSS score of 5.4 (MEDIUM). Multiple cross-site scripting (XSS) vulnerabilities in Koha 3.14.x before 3.14.16, 3.16.x before 3.16.12, 3.18.x before 3.18.08, and 3.20.x before 3.20.1 allow remote attackers to inject arbitrary web...
How severe is CVE-2015-4631?
CVE-2015-4631 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-4631?
Check the references section above for vendor advisories and patch information. Affected products include: Koha Koha.