{"api_version":"1","generated_at":"2026-04-26T15:57:56+00:00","cve":"CVE-2023-0650","urls":{"html":"https://cve.report/CVE-2023-0650","api":"https://cve.report/api/cve/CVE-2023-0650.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-0650","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-0650"},"summary":{"title":"CVE-2023-0650","description":"A vulnerability was found in YAFNET up to 3.1.11 and classified as problematic. This issue affects some unknown processing of the component Signature Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.12 is able to address this issue. The identifier of the patch is a1442a2bacc3335461b44c250e81f8d99c60735f. It is recommended to upgrade the affected component. The identifier VDB-220037 was assigned to this vulnerability.","state":"PUBLIC","assigner":"cna@vuldb.com","published_at":"2023-02-02 15:17:00","updated_at":"2023-11-15 03:15:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"https://vuldb.com/?id.220037","name":"https://vuldb.com/?id.220037","refsource":"MISC","tags":[],"title":"","mime":"text/plain","httpstatus":"403","archivestatus":"404"},{"url":"https://vuldb.com/?ctiid.220037","name":"https://vuldb.com/?ctiid.220037","refsource":"MISC","tags":[],"title":"","mime":"text/plain","httpstatus":"403","archivestatus":"404"},{"url":"https://drive.google.com/drive/folders/1iJuhjLQy3QPIgKKgWUzEEfr_q0boaR00?usp=sharing","name":"https://drive.google.com/drive/folders/1iJuhjLQy3QPIgKKgWUzEEfr_q0boaR00?usp=sharing","refsource":"MISC","tags":[],"title":"Update your browser to use Google Drive, Docs, Sheets, Sites, Slides, and Forms - Google Drive Help","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/YAFNET/YAFNET/security/advisories/GHSA-mg6p-jjff-7g5m","name":"https://github.com/YAFNET/YAFNET/security/advisories/GHSA-mg6p-jjff-7g5m","refsource":"MISC","tags":[],"title":"YAFNET XSS in EditSignature Page · Advisory · YAFNET/YAFNET · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/YAFNET/YAFNET/releases/tag/v3.1.12","name":"https://github.com/YAFNET/YAFNET/releases/tag/v3.1.12","refsource":"MISC","tags":[],"title":"Release YAF.NET v3.1.12 · YAFNET/YAFNET · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/YAFNET/YAFNET/commit/a1442a2bacc3335461b44c250e81f8d99c60735f","name":"https://github.com/YAFNET/YAFNET/commit/a1442a2bacc3335461b44c250e81f8d99c60735f","refsource":"MISC","tags":[],"title":"[FIXED] Stored XSS in Signature · YAFNET/YAFNET@a1442a2 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-0650","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-0650","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"650","vulnerable":"1","versionEndIncluding":"3.1.11","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"yetanotherforum","cpe5":"yaf.net","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-0650","ASSIGNER":"cna@vuldb.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"A vulnerability was found in YAFNET up to 3.1.11 and classified as problematic. This issue affects some unknown processing of the component Signature Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.12 is able to address this issue. The identifier of the patch is a1442a2bacc3335461b44c250e81f8d99c60735f. It is recommended to upgrade the affected component. The identifier VDB-220037 was assigned to this vulnerability."},{"lang":"deu","value":"Eine problematische Schwachstelle wurde in YAFNET bis 3.1.11 gefunden. Dies betrifft einen unbekannten Teil der Komponente Signature Handler. Durch Manipulation mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung. Ein Aktualisieren auf die Version 3.1.12 vermag dieses Problem zu lösen. Der Patch wird als a1442a2bacc3335461b44c250e81f8d99c60735f bezeichnet. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-79 Cross Site Scripting","cweId":"CWE-79"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"YAFNET","version":{"version_data":[{"version_affected":"=","version_value":"3.1.0"},{"version_affected":"=","version_value":"3.1.1"},{"version_affected":"=","version_value":"3.1.2"},{"version_affected":"=","version_value":"3.1.3"},{"version_affected":"=","version_value":"3.1.4"},{"version_affected":"=","version_value":"3.1.5"},{"version_affected":"=","version_value":"3.1.6"},{"version_affected":"=","version_value":"3.1.7"},{"version_affected":"=","version_value":"3.1.8"},{"version_affected":"=","version_value":"3.1.9"},{"version_affected":"=","version_value":"3.1.10"},{"version_affected":"=","version_value":"3.1.11"}]}}]}}]}},"references":{"reference_data":[{"url":"https://vuldb.com/?id.220037","refsource":"MISC","name":"https://vuldb.com/?id.220037"},{"url":"https://vuldb.com/?ctiid.220037","refsource":"MISC","name":"https://vuldb.com/?ctiid.220037"},{"url":"https://drive.google.com/drive/folders/1iJuhjLQy3QPIgKKgWUzEEfr_q0boaR00?usp=sharing","refsource":"MISC","name":"https://drive.google.com/drive/folders/1iJuhjLQy3QPIgKKgWUzEEfr_q0boaR00?usp=sharing"},{"url":"https://github.com/YAFNET/YAFNET/security/advisories/GHSA-mg6p-jjff-7g5m","refsource":"MISC","name":"https://github.com/YAFNET/YAFNET/security/advisories/GHSA-mg6p-jjff-7g5m"},{"url":"https://github.com/YAFNET/YAFNET/commit/a1442a2bacc3335461b44c250e81f8d99c60735f","refsource":"MISC","name":"https://github.com/YAFNET/YAFNET/commit/a1442a2bacc3335461b44c250e81f8d99c60735f"},{"url":"https://github.com/YAFNET/YAFNET/releases/tag/v3.1.12","refsource":"MISC","name":"https://github.com/YAFNET/YAFNET/releases/tag/v3.1.12"}]},"credits":[{"lang":"en","value":"Chun-Li Lin"},{"lang":"en","value":"lin7lic (VulDB User)"}],"impact":{"cvss":[{"version":"3.1","baseScore":3.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"},{"version":"3.0","baseScore":3.5,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"},{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N"}]}},"nvd":{"publishedDate":"2023-02-02 15:17:00","lastModifiedDate":"2023-11-15 03:15:00","problem_types":["CWE-79"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.3,"impactScore":2.7}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:yetanotherforum:yaf.net:*:*:*:*:*:*:*:*","versionEndIncluding":"3.1.11","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}