Skip to end of metadata
Go to start of metadata


SummaryIt was potentially possible to inject executable Javascript code within the phone profile field and linked text profile fields.
Advisory Release Date

2021-10-15

Product

Linchpin User Profiles
Linchpin Essentials
Linchpin Intranet Suite

Affected Versions

Linchpin Intranet Suite 5.1.0 and all prior versions

Linchpin Essentials 2.1.0 and all prior versions

Linchpin User Profiles 3.1.1 and all prior versions

Fixed Versions

Linchpin Intranet Suite 5.1.1

Linchpin Essentials 2.1.1

Linchpin User Profiles 3.1.3

Problem

During an internal security audit, we noticed that users were potentially able to execute Javascript code by inserting it into a phone field or into a field that is used as a reference in linked fields. This could have happened by bypassing the profile's save action and changing values, for example telephone numbers.

Affected are the apps Linchpin User Profiles up to and including version 3.1.1, Linchpin Intranet Suite up to and including version 5.1.0 and Linchpin Essentials up to and including version 2.1.0.

Severity

The vulnerability is rated as 8.7 according to CVSS. The score is calculated as CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N.

Workaround

There is no workaround but your system is not affected if you do not use the "phone" profile field or the linking feature of the "text" profile field.


Solution

For Linchpin User Profiles customers: Update to Linchpin User Profiles version 3.1.3 or later.

For Linchpin Essentials customers: Update to Linchpin Essentials 2.1.1 or later.

For Linchpin Suite customers: Update to Linchpin Suite 5.1.1 or later.


Should you be unable to update the Linchpin Intranet Suite to one of the listed versions, please reach out to our support team at https://seibert.biz/help.


  • No labels
This page was last edited on 11/17/2021.