Description
A vulnerability was detected in jakowenko double-take up to 1.13.1. The impacted element is the function app.use of the file api/src/app.js of the component API. The manipulation of the argument X-Ingress-Path results in cross site scripting. The attack can be executed remotely. Upgrading to version 1.13.2 is sufficient to resolve this issue. The patch is identified as e11de9dd6b4ea6b7ec9a5607a920d48961e9fa50. The affected component should be upgraded.
In jakowenko double-take up to 1.13.1 ist eine Schwachstelle entdeckt worden. Betroffen ist die Funktion app.use der Datei api/src/app.js der Komponente API. Die Manipulation des Arguments X-Ingress-Path führt zu cross site scripting. Es ist möglich, den Angriff aus der Ferne durchzuführen. Das Aktualisieren auf Version 1.13.2 kann dieses Problem lösen. Der Patch trägt den Namen e11de9dd6b4ea6b7ec9a5607a920d48961e9fa50. Es wird geraten, die betroffene Komponente zu aktualisieren.
Problem types
Product status
1.13.1
1.13.2
Timeline
2025-10-06: | Advisory disclosed |
2025-10-06: | VulDB entry created |
2025-10-06: | VulDB entry last update |
Credits
omega3663 (VulDB User)
References
vuldb.com/?id.327247 (VDB-327247 | jakowenko double-take API app.js app.use cross site scripting)
vuldb.com/?ctiid.327247 (VDB-327247 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.664967 (Submit #664967 | David Jakowenko Double Take <= v1.13.1 Cross Site Scripting)
github.com/...ommit/e11de9dd6b4ea6b7ec9a5607a920d48961e9fa50
github.com/jakowenko/double-take/releases/tag/v1.13.2