|Confidentiality Impact||Partial (There is considerable informational disclosure.)|
|Integrity Impact||Partial (Modification of some system files or information is possible, but the attacker does not have control over what can be modified, or the scope of what the attacker can affect is limited.)|
|Availability Impact||Partial (There is reduced performance or interruptions in resource availability.)|
|Access Complexity||Medium (The access conditions are somewhat specialized. Some preconditions must be satistified to exploit)|
|Authentication||Not required (Authentication is not required to exploit the vulnerability.)|
|Vulnerability Type(s)||Cross Site Scripting|
|CWE ID||CWE id is not defined for this vulnerability|
Version: Tested on GForge 4.5.11
Discovered by: José Ramón Palanco: firstname.lastname@example.org
GForge is vulnerable to a security vulnerability that allow Cross-Site Scripting attacks. Due to improper filtering, a remote attacker can exploit a cross site scripting.
To exploit any attacker may send via GET method the “words” variable to:
where X is any active project in the gforge installation.