Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-39350: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in DependencyTrack frontend

0
Medium
Published: Tue Oct 25 2022 (10/25/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: DependencyTrack
Product: frontend

Description

@dependencytrack/frontend is a Single Page Application (SPA) used in Dependency-Track, an open source Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain. Due to the common practice of providing vulnerability details in markdown format, the Dependency-Track frontend renders them using the JavaScript library Showdown. Showdown does not have any XSS countermeasures built in, and versions before 4.6.1 of the Dependency-Track frontend did not encode or sanitize Showdown's output. This made it possible for arbitrary JavaScript included in vulnerability details via HTML attributes to be executed in context of the frontend. Actors with the `VULNERABILITY_MANAGEMENT` permission can exploit this weakness by creating or editing a custom vulnerability and providing XSS payloads in any of the following fields: Description, Details, Recommendation, or References. The payload will be executed for users with the `VIEW_PORTFOLIO` permission when browsing to the modified vulnerability's page. Alternatively, malicious JavaScript could be introduced via any of the vulnerability databases mirrored by Dependency-Track. However, this attack vector is highly unlikely, and the maintainers of Dependency-Track are not aware of any occurrence of this happening. Note that the `Vulnerability Details` element of the `Audit Vulnerabilities` tab in the project view is not affected. The issue has been fixed in frontend version 4.6.1.

AI-Powered Analysis

AILast updated: 06/22/2025, 14:51:52 UTC

Technical Analysis

CVE-2022-39350 is a cross-site scripting (XSS) vulnerability identified in the frontend component of Dependency-Track, an open-source software composition analysis platform widely used to manage and reduce risks in the software supply chain. The frontend is a Single Page Application (SPA) that renders vulnerability details, often provided in markdown format, using the JavaScript library Showdown. Showdown, however, lacks built-in XSS protections. Prior to version 4.6.1 of the Dependency-Track frontend, the application did not sanitize or encode Showdown's output, allowing malicious JavaScript embedded in HTML attributes within vulnerability details to execute in the context of the frontend application. Exploitation requires an attacker to have the `VULNERABILITY_MANAGEMENT` permission, enabling them to create or edit custom vulnerabilities and inject XSS payloads into fields such as Description, Details, Recommendation, or References. When users with the `VIEW_PORTFOLIO` permission view the affected vulnerability page, the malicious script executes. Although theoretically possible, injection via mirrored vulnerability databases is considered highly unlikely and has not been observed in the wild. The vulnerability does not affect the `Vulnerability Details` element in the `Audit Vulnerabilities` tab. The issue was addressed in frontend version 4.6.1 by implementing proper sanitization and encoding of Showdown's output to prevent script execution. No known exploits have been reported in the wild, but the vulnerability poses a risk of unauthorized script execution within the application context, potentially leading to session hijacking, unauthorized actions, or data exposure within the Dependency-Track environment.

Potential Impact

For European organizations using Dependency-Track versions prior to 4.6.1, this vulnerability could allow malicious insiders or compromised accounts with `VULNERABILITY_MANAGEMENT` privileges to execute arbitrary JavaScript in the browsers of users with `VIEW_PORTFOLIO` permissions. This could lead to unauthorized access to sensitive vulnerability data, session token theft, or manipulation of the user interface to perform unauthorized actions. Given Dependency-Track's role in managing software supply chain risks, exploitation could undermine trust in vulnerability data integrity and confidentiality, potentially delaying or misdirecting remediation efforts. This risk is particularly significant for organizations with complex software supply chains or regulatory requirements for software security and vulnerability management, such as those in finance, healthcare, and critical infrastructure sectors. However, the requirement for elevated permissions to inject payloads limits the attack surface primarily to insider threats or compromised privileged accounts. The lack of known active exploitation reduces immediate risk but does not eliminate the potential for targeted attacks, especially in environments where Dependency-Track is integrated into broader security workflows.

Mitigation Recommendations

1. Upgrade Dependency-Track frontend to version 4.6.1 or later immediately to ensure the vulnerability is patched. 2. Review and restrict `VULNERABILITY_MANAGEMENT` permissions to the minimum necessary users, enforcing the principle of least privilege to reduce the risk of malicious payload injection. 3. Implement monitoring and alerting on changes to custom vulnerabilities, especially those created or edited by users with elevated permissions, to detect suspicious activity. 4. Conduct regular audits of vulnerability entries for anomalous or unexpected HTML or script content. 5. Employ Content Security Policy (CSP) headers in the Dependency-Track deployment to restrict the execution of inline scripts and limit the impact of any potential XSS payloads. 6. Educate users with `VULNERABILITY_MANAGEMENT` and `VIEW_PORTFOLIO` permissions about the risks of XSS and encourage reporting of suspicious behavior. 7. If feasible, isolate Dependency-Track frontend access to trusted networks or VPNs to reduce exposure to external attackers. 8. Integrate Dependency-Track with centralized logging and SIEM solutions to correlate and investigate potential exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-09-02T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9846c4522896dcbf4934

Added to database: 5/21/2025, 9:09:26 AM

Last enriched: 6/22/2025, 2:51:52 PM

Last updated: 2/7/2026, 12:04:58 PM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats