<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://en.wiki4.bluespice.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Mglaser</id>
	<title>BlueSpice Helpdesk - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://en.wiki4.bluespice.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Mglaser"/>
	<link rel="alternate" type="text/html" href="https://en.wiki4.bluespice.com/wiki/Special:Contributions/Mglaser"/>
	<updated>2026-05-17T21:13:55Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.39.17</generator>
	<entry>
		<id>https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2023-01&amp;diff=7063</id>
		<title>Security:Security Advisories/BSSA-2023-01</title>
		<link rel="alternate" type="text/html" href="https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2023-01&amp;diff=7063"/>
		<updated>2023-07-25T13:35:24Z</updated>

		<summary type="html">&lt;p&gt;Mglaser: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2023-07-25&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|Medium&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
|&lt;br /&gt;
* BlueSpice Infrastructure: Ghostscript&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|&lt;br /&gt;
* Ghostscript 9.53.3 and 10.01.2&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2023-36664 CVE-2023-36664]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
A bug in ghostscript can be exploited to run arbitrary code on the host machine using prepared PDF document. In BlueSpice, when a) PDFHandler is enabled and b) a PDF document is uploaded, a preview image is being generated using ghostscript. If an attacker uploads a prepared PDF, they can execute code on the server.&lt;br /&gt;
&lt;br /&gt;
PDFHandler is not enabled by default, but many installations have set it active.&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
Upgrade Ghostscript to a fixed version and ensure the updated version is used by adding &amp;lt;code&amp;gt;$wgPdfProcessor = &#039;/usr/bin/gs&#039;;&amp;lt;/code&amp;gt; to &amp;lt;code&amp;gt;LocalSettings.php&amp;lt;/code&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
If upgrade of Ghostscript is not possible, disable the extension PDFHandler. This, however, removes the ability for BlueSpice to render PDF preview images.&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* For Debian: https://www.debian.org/security/2023/dsa-5446&lt;br /&gt;
* For Ubuntu: https://launchpad.net/ubuntu/+source/ghostscript/9.50~dfsg-5ubuntu4.8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
Found during an internal security audit.&lt;/div&gt;</summary>
		<author><name>Mglaser</name></author>
	</entry>
	<entry>
		<id>https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2023-01&amp;diff=7062</id>
		<title>Security:Security Advisories/BSSA-2023-01</title>
		<link rel="alternate" type="text/html" href="https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2023-01&amp;diff=7062"/>
		<updated>2023-07-25T12:43:51Z</updated>

		<summary type="html">&lt;p&gt;Mglaser: Ghostscript BSSA&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2023-07-25&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|Medium&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
|&lt;br /&gt;
* BlueSpice Infrastructure: Ghostscript&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|&lt;br /&gt;
* Ghostscript 9.53.0 and 10.01.2&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2023-36664 CVE-2023-36664]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
A bug in ghostscript can be exploited to run arbitrary code on the host machine using prepared PDF document. In BlueSpice, when a) PDFHandler is enabled and b) a PDF document is uploaded, a preview image is being generated using ghostscript. If an attacker uploads a prepared PDF, they can execute code on the server.&lt;br /&gt;
&lt;br /&gt;
PDFHandler is not enabled by default, but many installations have set it active.&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
Upgrade Ghostscript to a fixed version.&lt;br /&gt;
&lt;br /&gt;
If upgrade of Ghostscript is not possible, disable the extension PDFHandler. This, however, removes the ability for BlueSpice to render PDF preview images.&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* For Debian: https://www.debian.org/security/2023/dsa-5446&lt;br /&gt;
* For Ubuntu: https://launchpad.net/ubuntu/+source/ghostscript/9.50~dfsg-5ubuntu4.8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
Found during an internal security audit.&lt;/div&gt;</summary>
		<author><name>Mglaser</name></author>
	</entry>
	<entry>
		<id>https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories&amp;diff=5235</id>
		<title>Security:Security Advisories</title>
		<link rel="alternate" type="text/html" href="https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories&amp;diff=5235"/>
		<updated>2022-11-15T08:21:20Z</updated>

		<summary type="html">&lt;p&gt;Mglaser: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;width:100%;&amp;quot;&lt;br /&gt;
!Release name&lt;br /&gt;
!Release date&lt;br /&gt;
!Title&lt;br /&gt;
!References&lt;br /&gt;
!Summary&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2022-01|BSSA-2022-01]]&lt;br /&gt;
|2022-01-31&lt;br /&gt;
|XSS attack vector in Search Center&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2022-2510 CVE-2022-2510]&lt;br /&gt;
|JavaScript in search field is reflected back to the browser.&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2022-02|BSSA-2022-02]]&lt;br /&gt;
|2022-11-15&lt;br /&gt;
|XSS attack vector on regular pages&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2022-2511 CVE-2022-2511]&lt;br /&gt;
|Arbitrary HTML injection through the &#039;title&#039; parameter&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2022-03|BSSA-2022-03]]&lt;br /&gt;
|2022-11-15&lt;br /&gt;
|XSS attack vector on regular pages&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2022-41611 CVE-2022-41611]&lt;br /&gt;
|Arbitrary HTML injection through main navigation&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2022-04|BSSA-2022-04]]&lt;br /&gt;
|2022-11-15&lt;br /&gt;
|XSS attack vector on regular pages&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2022-41789 CVE-2022-41789], [https://www.cve.org/CVERecord?id=CVE-2022-41814 CVE-2022-41814], [https://www.cve.org/CVERecord?id=CVE-2022-42000 CVE-2022-42000]&lt;br /&gt;
|Arbitrary HTML injection through user preferences&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2022-05|BSSA-2022-05]]&lt;br /&gt;
|2022-11-15&lt;br /&gt;
|XSS attack vector on regular pages&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2022-42001 CVE-2022-42001]&lt;br /&gt;
|Arbitrary HTML injection through the book navigation&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2022-06|BSSA-2022-06]]&lt;br /&gt;
|2022-11-15&lt;br /&gt;
|XSS attack vector on regular pages&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2022-3893 CVE-2022-3893]&lt;br /&gt;
|Arbitrary HTML injection through the custom menu&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2022-07|BSSA-2022-07]]&lt;br /&gt;
|2022-11-15&lt;br /&gt;
|XSS attack vector on regular pages&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2022-3958 CVE-2022-3958]&lt;br /&gt;
|Arbitrary HTML injection through personal menu items&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2022-08|BSSA-2022-08]]&lt;br /&gt;
|2022-11-15&lt;br /&gt;
|XSS attack vector on regular pages&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2022-3895 CVE-2022-3895]&lt;br /&gt;
|Arbitrary HTML injection through use of interface elements&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Mglaser</name></author>
	</entry>
	<entry>
		<id>https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2022-08&amp;diff=5234</id>
		<title>Security:Security Advisories/BSSA-2022-08</title>
		<link rel="alternate" type="text/html" href="https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2022-08&amp;diff=5234"/>
		<updated>2022-11-15T08:11:52Z</updated>

		<summary type="html">&lt;p&gt;Mglaser: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2022-11-15&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|Medium&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
|&lt;br /&gt;
* BlueSpice 4.x&lt;br /&gt;
* Common User Interface 3.0.x&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|&lt;br /&gt;
* BlueSpice 4.2.1&lt;br /&gt;
* Common User Interface 3.0.5&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2022-3895 CVE-2022-3895]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
Some UI elements of the Common user interface component are not properly sanitizing output and therefore prone to output arbitrary HTML (XSS).&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
Upgrade to Common User Interface 3.0.5 or later. This is included in BlueSpice 4.2.1 or later.&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
Found during an internal security audit.&lt;/div&gt;</summary>
		<author><name>Mglaser</name></author>
	</entry>
	<entry>
		<id>https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2022-07&amp;diff=5233</id>
		<title>Security:Security Advisories/BSSA-2022-07</title>
		<link rel="alternate" type="text/html" href="https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2022-07&amp;diff=5233"/>
		<updated>2022-11-15T08:11:23Z</updated>

		<summary type="html">&lt;p&gt;Mglaser: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2022-11-15&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|Medium&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
|BlueSpice 4.x&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|BlueSpice 4.2.1&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2022-3958 CVE-2022-3958]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
Users with edit rights are able to inject arbitrary HTML (XSS) into a user&#039;s personal navigation by editing a menu item. This allows for targeted attacks&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
Upgrade to BlueSpice 4.2.1&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
Found during an internal security audit.&lt;/div&gt;</summary>
		<author><name>Mglaser</name></author>
	</entry>
	<entry>
		<id>https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2022-06&amp;diff=5232</id>
		<title>Security:Security Advisories/BSSA-2022-06</title>
		<link rel="alternate" type="text/html" href="https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2022-06&amp;diff=5232"/>
		<updated>2022-11-15T08:11:00Z</updated>

		<summary type="html">&lt;p&gt;Mglaser: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2022-11-15&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|Low&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
|BlueSpice 4.x&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|BlueSpice 4.2.1&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2022-3893 CVE-2022-3893]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
Users with admin rights are able to inject arbitrary HTML (XSS) into custom navigation by editing a menu item.&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
Upgrade to BlueSpice 4.2.1&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
Found during an internal security audit.&lt;/div&gt;</summary>
		<author><name>Mglaser</name></author>
	</entry>
	<entry>
		<id>https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2022-05&amp;diff=5231</id>
		<title>Security:Security Advisories/BSSA-2022-05</title>
		<link rel="alternate" type="text/html" href="https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2022-05&amp;diff=5231"/>
		<updated>2022-11-15T08:10:35Z</updated>

		<summary type="html">&lt;p&gt;Mglaser: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2022-11-15&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|Low&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
|BlueSpice 4.x&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|BlueSpice 4.2.1&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2022-42001 CVE-2022-42001]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
Users with edit rights are able to inject arbitrary HTML (XSS) into book navigation by editing a book chapter title.&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
Upgrade to BlueSpice 4.2.1&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
Found during an internal security audit.&lt;/div&gt;</summary>
		<author><name>Mglaser</name></author>
	</entry>
	<entry>
		<id>https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2022-04&amp;diff=5230</id>
		<title>Security:Security Advisories/BSSA-2022-04</title>
		<link rel="alternate" type="text/html" href="https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2022-04&amp;diff=5230"/>
		<updated>2022-11-15T08:10:06Z</updated>

		<summary type="html">&lt;p&gt;Mglaser: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2022-11-15&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|Low&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
|BlueSpice 4.x&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|BlueSpice 4.2.1&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2022-41789 CVE-2022-41789]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2022-41814 CVE-2022-41814]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2022-42000 CVE-2022-42000]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
Logged in users are able to inject arbitrary HTML (XSS) into several locations in the main interface by editing their user preferences.&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
Upgrade to BlueSpice 4.2.1&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
Found during an internal security audit.&lt;/div&gt;</summary>
		<author><name>Mglaser</name></author>
	</entry>
	<entry>
		<id>https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2022-03&amp;diff=5229</id>
		<title>Security:Security Advisories/BSSA-2022-03</title>
		<link rel="alternate" type="text/html" href="https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2022-03&amp;diff=5229"/>
		<updated>2022-11-15T08:09:17Z</updated>

		<summary type="html">&lt;p&gt;Mglaser: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2022-11-15&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|Low&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
|BlueSpice 4.x&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|BlueSpice 4.2.1&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2022-41611 CVE-2022-41611]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
Users with admin rights are able to inject arbitrary HTML (XSS) into main navigation by editing a menu item.&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
Upgrade to BlueSpice 4.2.1&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
Found during an internal security audit.&lt;/div&gt;</summary>
		<author><name>Mglaser</name></author>
	</entry>
	<entry>
		<id>https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2022-08&amp;diff=5227</id>
		<title>Security:Security Advisories/BSSA-2022-08</title>
		<link rel="alternate" type="text/html" href="https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2022-08&amp;diff=5227"/>
		<updated>2022-11-11T16:12:17Z</updated>

		<summary type="html">&lt;p&gt;Mglaser: Created page with &amp;quot;{| class=&amp;quot;wikitable&amp;quot; |+ ! ! |- |Date |2022-11-08 |- |Severity |Medium |- |Affected | * BlueSpice 4.x * Common User Interface 3.0.x |- |Fixed in | * BlueSpice 4.2.1 * Common Us...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2022-11-08&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|Medium&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
|&lt;br /&gt;
* BlueSpice 4.x&lt;br /&gt;
* Common User Interface 3.0.x&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|&lt;br /&gt;
* BlueSpice 4.2.1&lt;br /&gt;
* Common User Interface 3.0.5&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2022-3895 CVE-2022-3895]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
Some UI elements of the Common user interface component are not properly sanitizing output and therefore prone to output arbitrary HTML (XSS).&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
Upgrade to Common User Interface 3.0.5 or later. This is included in BlueSpice 4.2.1 or later.&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
Found during an internal security audit.&lt;/div&gt;</summary>
		<author><name>Mglaser</name></author>
	</entry>
	<entry>
		<id>https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2022-07&amp;diff=5226</id>
		<title>Security:Security Advisories/BSSA-2022-07</title>
		<link rel="alternate" type="text/html" href="https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2022-07&amp;diff=5226"/>
		<updated>2022-11-11T15:57:30Z</updated>

		<summary type="html">&lt;p&gt;Mglaser: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2022-11-08&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|Medium&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
|BlueSpice 4.x&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|BlueSpice 4.2.1&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2022-3958 CVE-2022-3958]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
Users with edit rights are able to inject arbitrary HTML (XSS) into a user&#039;s personal navigation by editing a menu item. This allows for targeted attacks&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
Upgrade to BlueSpice 4.2.1&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
Found during an internal security audit.&lt;/div&gt;</summary>
		<author><name>Mglaser</name></author>
	</entry>
	<entry>
		<id>https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2022-05&amp;diff=5225</id>
		<title>Security:Security Advisories/BSSA-2022-05</title>
		<link rel="alternate" type="text/html" href="https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2022-05&amp;diff=5225"/>
		<updated>2022-11-11T15:50:51Z</updated>

		<summary type="html">&lt;p&gt;Mglaser: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2022-11-08&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|Low&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
|BlueSpice 4.x&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|BlueSpice 4.2.1&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2022-42001 CVE-2022-42001]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
Users with edit rights are able to inject arbitrary HTML (XSS) into book navigation by editing a book chapter title.&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
Upgrade to BlueSpice 4.2.1&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
Found during an internal security audit.&lt;/div&gt;</summary>
		<author><name>Mglaser</name></author>
	</entry>
	<entry>
		<id>https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2022-06&amp;diff=5224</id>
		<title>Security:Security Advisories/BSSA-2022-06</title>
		<link rel="alternate" type="text/html" href="https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2022-06&amp;diff=5224"/>
		<updated>2022-11-11T15:48:50Z</updated>

		<summary type="html">&lt;p&gt;Mglaser: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2022-11-08&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|Low&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
|BlueSpice 4.x&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|BlueSpice 4.2.1&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2022-3893 CVE-2022-3893]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
Users with admin rights are able to inject arbitrary HTML (XSS) into custom navigation by editing a menu item.&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
Upgrade to BlueSpice 4.2.1&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
Found during an internal security audit.&lt;/div&gt;</summary>
		<author><name>Mglaser</name></author>
	</entry>
	<entry>
		<id>https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2022-04&amp;diff=5223</id>
		<title>Security:Security Advisories/BSSA-2022-04</title>
		<link rel="alternate" type="text/html" href="https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2022-04&amp;diff=5223"/>
		<updated>2022-11-11T15:40:10Z</updated>

		<summary type="html">&lt;p&gt;Mglaser: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2022-11-08&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|Low&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
|BlueSpice 4.x&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|BlueSpice 4.2.1&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2022-41789 CVE-2022-41789]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2022-41814 CVE-2022-41814]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2022-42000 CVE-2022-42000]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
Logged in users are able to inject arbitrary HTML (XSS) into several locations in the main interface by editing their user preferences.&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
Upgrade to BlueSpice 4.2.1&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
Found during an internal security audit.&lt;/div&gt;</summary>
		<author><name>Mglaser</name></author>
	</entry>
	<entry>
		<id>https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2022-07&amp;diff=5222</id>
		<title>Security:Security Advisories/BSSA-2022-07</title>
		<link rel="alternate" type="text/html" href="https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2022-07&amp;diff=5222"/>
		<updated>2022-11-11T15:21:47Z</updated>

		<summary type="html">&lt;p&gt;Mglaser: Created page with &amp;quot;{| class=&amp;quot;wikitable&amp;quot; |+ ! ! |- |Date |2022-11-08 |- |Severity |Medium |- |Affected |BlueSpice 4.x |- |Fixed in |BlueSpice 4.2.1 |- |CVE |[https://www.cve.org/CVERecord?id=CVE-...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2022-11-08&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|Medium&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
|BlueSpice 4.x&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|BlueSpice 4.2.1&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2022-416XX CVE-2022-416XX]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
Users with edit rights are able to inject arbitrary HTML (XSS) into a user&#039;s personal navigation by editing a menu item. This allows for targeted attacks&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
Upgrade to BlueSpice 4.2.1&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
Found during an internal security audit.&lt;/div&gt;</summary>
		<author><name>Mglaser</name></author>
	</entry>
	<entry>
		<id>https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2022-06&amp;diff=5221</id>
		<title>Security:Security Advisories/BSSA-2022-06</title>
		<link rel="alternate" type="text/html" href="https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2022-06&amp;diff=5221"/>
		<updated>2022-11-11T15:20:46Z</updated>

		<summary type="html">&lt;p&gt;Mglaser: Created page with &amp;quot;{| class=&amp;quot;wikitable&amp;quot; |+ ! ! |- |Date |2022-11-08 |- |Severity |Low |- |Affected |BlueSpice 4.x |- |Fixed in |BlueSpice 4.2.1 |- |CVE |[https://www.cve.org/CVERecord?id=CVE-202...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2022-11-08&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|Low&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
|BlueSpice 4.x&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|BlueSpice 4.2.1&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2022-416XX CVE-2022-416XX]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
Users with admin rights are able to inject arbitrary HTML (XSS) into custom navigation by editing a menu item.&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
Upgrade to BlueSpice 4.2.1&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
Found during an internal security audit.&lt;/div&gt;</summary>
		<author><name>Mglaser</name></author>
	</entry>
	<entry>
		<id>https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2022-05&amp;diff=5220</id>
		<title>Security:Security Advisories/BSSA-2022-05</title>
		<link rel="alternate" type="text/html" href="https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2022-05&amp;diff=5220"/>
		<updated>2022-11-11T15:19:16Z</updated>

		<summary type="html">&lt;p&gt;Mglaser: Created page with &amp;quot;{| class=&amp;quot;wikitable&amp;quot; |+ ! ! |- |Date |2022-11-08 |- |Severity |Low |- |Affected |BlueSpice 4.x |- |Fixed in |BlueSpice 4.2.1 |- |CVE |[https://www.cve.org/CVERecord?id=CVE-202...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2022-11-08&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|Low&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
|BlueSpice 4.x&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|BlueSpice 4.2.1&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2022-41XXX CVE-2022-41XXXX]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
Users with edit rights are able to inject arbitrary HTML (XSS) into book navigation by editing a book chapter.&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
Upgrade to BlueSpice 4.2.1&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
Found during an internal security audit.&lt;/div&gt;</summary>
		<author><name>Mglaser</name></author>
	</entry>
	<entry>
		<id>https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2022-04&amp;diff=5219</id>
		<title>Security:Security Advisories/BSSA-2022-04</title>
		<link rel="alternate" type="text/html" href="https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2022-04&amp;diff=5219"/>
		<updated>2022-11-11T15:18:06Z</updated>

		<summary type="html">&lt;p&gt;Mglaser: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2022-11-08&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|Medium&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
|BlueSpice 4.x&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|BlueSpice 4.2.1&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2022-41789 CVE-2022-41789]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2022-41789 CVE-2022-41789]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2022-41789 CVE-2022-41789]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
Logged in users are able to inject arbitrary HTML (XSS) into several locations in the main interface by editing their user preferences.&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
Upgrade to BlueSpice 4.2.1&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
Found during an internal security audit.&lt;/div&gt;</summary>
		<author><name>Mglaser</name></author>
	</entry>
	<entry>
		<id>https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2022-04&amp;diff=5218</id>
		<title>Security:Security Advisories/BSSA-2022-04</title>
		<link rel="alternate" type="text/html" href="https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2022-04&amp;diff=5218"/>
		<updated>2022-11-11T15:16:38Z</updated>

		<summary type="html">&lt;p&gt;Mglaser: Created page with &amp;quot;{| class=&amp;quot;wikitable&amp;quot; |+ ! ! |- |Date |2022-11-08 |- |Severity |Medium |- |Affected |BlueSpice 4.x |- |Fixed in |BlueSpice 4.2.1 |- |CVE | * [https://www.cve.org/CVERecord?id=C...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2022-11-08&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|Medium&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
|BlueSpice 4.x&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|BlueSpice 4.2.1&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2022-41789 CVE-2022-41789]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2022-41789 CVE-2022-41789]&lt;br /&gt;
* [https://www.cve.org/CVERecord?id=CVE-2022-41789 CVE-2022-41789]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
Users with admin rights are able to inject arbitrary HTML (XSS) into several locations in the main interface by editing their user preferences.&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
Upgrade to BlueSpice 4.2.1&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
Found during an internal security audit.&lt;/div&gt;</summary>
		<author><name>Mglaser</name></author>
	</entry>
	<entry>
		<id>https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2022-03&amp;diff=5214</id>
		<title>Security:Security Advisories/BSSA-2022-03</title>
		<link rel="alternate" type="text/html" href="https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2022-03&amp;diff=5214"/>
		<updated>2022-11-08T16:15:19Z</updated>

		<summary type="html">&lt;p&gt;Mglaser: Created page with &amp;quot;{| class=&amp;quot;wikitable&amp;quot; |+ ! ! |- |Date |2022-11-08 |- |Severity |Low |- |Affected |BlueSpice 4.x |- |Fixed in |BlueSpice 4.2.1 |- |CVE |[https://www.cve.org/CVERecord?id=CVE-202...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2022-11-08&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|Low&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
|BlueSpice 4.x&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|BlueSpice 4.2.1&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2022-41611 CVE-2022-41611]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
Users with admin rights are able to inject arbitrary HTML (XSS) into main navigation by editing a menu item.&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
Upgrade to BlueSpice 4.2.1&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
Found during an internal security audit.&lt;/div&gt;</summary>
		<author><name>Mglaser</name></author>
	</entry>
	<entry>
		<id>https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2022-02&amp;diff=3912</id>
		<title>Security:Security Advisories/BSSA-2022-02</title>
		<link rel="alternate" type="text/html" href="https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2022-02&amp;diff=3912"/>
		<updated>2022-07-22T19:59:52Z</updated>

		<summary type="html">&lt;p&gt;Mglaser: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2022-04-25&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|Medium&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
|BlueSpice 4.x&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|4.1.3&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2022-2511 CVE-2022-2511]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
Users are able to inject arbitrary HTML (XSS) on regular pages, using a special value for the &amp;lt;code&amp;gt;title&amp;lt;/code&amp;gt; parameter. This can be triggered via URL.&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
Upgrade to BlueSpice 4.1.3&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
Special thanks to the security team of an undisclosed customer&lt;/div&gt;</summary>
		<author><name>Mglaser</name></author>
	</entry>
	<entry>
		<id>https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2022-01&amp;diff=3911</id>
		<title>Security:Security Advisories/BSSA-2022-01</title>
		<link rel="alternate" type="text/html" href="https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2022-01&amp;diff=3911"/>
		<updated>2022-07-22T19:57:56Z</updated>

		<summary type="html">&lt;p&gt;Mglaser: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2022-01-31&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|Medium&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
|BlueSpice 3.x, BlueSpice 4.x&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|BlueSpice 3.2.9, BlueSpice 4.1.1&lt;br /&gt;
|-&lt;br /&gt;
|CVE&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2022-2510 CVE-2022-2510]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
Users are able to inject arbitrary HTML (XSS) on Special:SearchCenter, using the search term. This can be triggered via URL.&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
Upgrade to BlueSpice 4.1.1&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
Special thanks to the security team of an undisclosed customer&lt;/div&gt;</summary>
		<author><name>Mglaser</name></author>
	</entry>
	<entry>
		<id>https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories&amp;diff=3910</id>
		<title>Security:Security Advisories</title>
		<link rel="alternate" type="text/html" href="https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories&amp;diff=3910"/>
		<updated>2022-07-22T19:56:25Z</updated>

		<summary type="html">&lt;p&gt;Mglaser: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;width:100%;&amp;quot;&lt;br /&gt;
!Release name&lt;br /&gt;
!Release date&lt;br /&gt;
!Title&lt;br /&gt;
!References&lt;br /&gt;
!Summary&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2022-01|BSSA-2022-01]]&lt;br /&gt;
|2022-01-31&lt;br /&gt;
|XSS attack vector in Search Center&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2022-2510 CVE-2022-2510]&lt;br /&gt;
|JavaScript in search field is reflected back to the browser.&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2022-02|BSSA-2022-02]]&lt;br /&gt;
|2022-04-25&lt;br /&gt;
|XSS attack vector on regular pages&lt;br /&gt;
|[https://www.cve.org/CVERecord?id=CVE-2022-2511 CVE-2022-2511]&lt;br /&gt;
|Arbitrary HTML injection through the &#039;title&#039; parameter&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Mglaser</name></author>
	</entry>
	<entry>
		<id>https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2022-01&amp;diff=2983</id>
		<title>Security:Security Advisories/BSSA-2022-01</title>
		<link rel="alternate" type="text/html" href="https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2022-01&amp;diff=2983"/>
		<updated>2022-03-24T14:33:10Z</updated>

		<summary type="html">&lt;p&gt;Mglaser: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2022-01-31&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|Medium&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
|BlueSpice 3.x, BlueSpice 4.x&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|BlueSpice 3.2.9, BlueSpice 4.1.1&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
Users are able to inject arbitrary HTML (XSS) on Special:SearchCenter, using the search term. This can be triggered via URL.&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
Upgrade to BlueSpice 4.1.1&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
Special thanks to the security team of an undisclosed customer&lt;/div&gt;</summary>
		<author><name>Mglaser</name></author>
	</entry>
	<entry>
		<id>https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories&amp;diff=2956</id>
		<title>Security:Security Advisories</title>
		<link rel="alternate" type="text/html" href="https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories&amp;diff=2956"/>
		<updated>2022-03-24T10:55:26Z</updated>

		<summary type="html">&lt;p&gt;Mglaser: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;width:100%;&amp;quot;&lt;br /&gt;
!Release name&lt;br /&gt;
!Release date&lt;br /&gt;
!Title&lt;br /&gt;
!References&lt;br /&gt;
!Summary&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2022-01|BSSA-2022-01]]&lt;br /&gt;
|2022-01-31&lt;br /&gt;
|XSS attack vector in Search Center&lt;br /&gt;
|CVE pending&lt;br /&gt;
|JavaScript in search field is reflected back to the browser.&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Mglaser</name></author>
	</entry>
	<entry>
		<id>https://en.wiki4.bluespice.com/w/index.php?title=SocialEntity:323&amp;diff=2955</id>
		<title>SocialEntity:323</title>
		<link rel="alternate" type="text/html" href="https://en.wiki4.bluespice.com/w/index.php?title=SocialEntity:323&amp;diff=2955"/>
		<updated>2022-03-24T10:54:20Z</updated>

		<summary type="html">&lt;p&gt;Mglaser: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{&lt;br /&gt;
    &amp;quot;wikipageid&amp;quot;: 1704,&lt;br /&gt;
    &amp;quot;namespace&amp;quot;: 0,&lt;br /&gt;
    &amp;quot;titletext&amp;quot;: &amp;quot;Security:Security Advisories/BSSA-2022-01&amp;quot;,&lt;br /&gt;
    &amp;quot;description&amp;quot;: &amp;quot;&amp;quot;,&lt;br /&gt;
    &amp;quot;parentid&amp;quot;: 0,&lt;br /&gt;
    &amp;quot;id&amp;quot;: 323,&lt;br /&gt;
    &amp;quot;ownerid&amp;quot;: 16,&lt;br /&gt;
    &amp;quot;type&amp;quot;: &amp;quot;wikipage&amp;quot;,&lt;br /&gt;
    &amp;quot;archived&amp;quot;: false,&lt;br /&gt;
    &amp;quot;tags&amp;quot;: [&lt;br /&gt;
        &amp;quot;Security:Security Advisories/BSSA-2022-01&amp;quot;&lt;br /&gt;
    ],&lt;br /&gt;
    &amp;quot;resolved&amp;quot;: false&lt;br /&gt;
}&lt;/div&gt;</summary>
		<author><name>Mglaser</name></author>
	</entry>
	<entry>
		<id>https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2022-01&amp;diff=2954</id>
		<title>Security:Security Advisories/BSSA-2022-01</title>
		<link rel="alternate" type="text/html" href="https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories/BSSA-2022-01&amp;diff=2954"/>
		<updated>2022-03-24T10:54:20Z</updated>

		<summary type="html">&lt;p&gt;Mglaser: Created page with &amp;quot;{| class=&amp;quot;wikitable&amp;quot; |+ ! ! |- |Date |2022-01-31 |- |Severity |Medium |- |Affected |BlueSpice 4.x |- |Fixed in |BlueSpice 4.1.2 |}  == Problem == Users are able to inject arbi...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!&lt;br /&gt;
|-&lt;br /&gt;
|Date&lt;br /&gt;
|2022-01-31&lt;br /&gt;
|-&lt;br /&gt;
|Severity&lt;br /&gt;
|Medium&lt;br /&gt;
|-&lt;br /&gt;
|Affected&lt;br /&gt;
|BlueSpice 4.x&lt;br /&gt;
|-&lt;br /&gt;
|Fixed in&lt;br /&gt;
|BlueSpice 4.1.2&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Problem ==&lt;br /&gt;
Users are able to inject arbitrary HTML (XSS) on Special:SearchCenter, using the search term. This can be triggered via URL.&lt;br /&gt;
&lt;br /&gt;
== Solution ==&lt;br /&gt;
Upgrade to BlueSpice 4.1.2&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
Special thanks to the security team of an undisclosed customer&lt;/div&gt;</summary>
		<author><name>Mglaser</name></author>
	</entry>
	<entry>
		<id>https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories&amp;diff=2953</id>
		<title>Security:Security Advisories</title>
		<link rel="alternate" type="text/html" href="https://en.wiki4.bluespice.com/w/index.php?title=Security:Security_Advisories&amp;diff=2953"/>
		<updated>2022-03-24T10:43:24Z</updated>

		<summary type="html">&lt;p&gt;Mglaser: Add information about XSS attack vulnerability&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;width:100%;&amp;quot;&lt;br /&gt;
!Release name&lt;br /&gt;
!Release date&lt;br /&gt;
!Title&lt;br /&gt;
!References&lt;br /&gt;
!Summary&lt;br /&gt;
|-&lt;br /&gt;
|[[Security:Security Advisories/BSSA-2022-01|BSSA-2022-01]]&lt;br /&gt;
|2022-01-31&lt;br /&gt;
|XSS attack vector in Search Center&lt;br /&gt;
|CVE-???&lt;br /&gt;
|JavaScript in search field is reflected back to the browser.&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Mglaser</name></author>
	</entry>
	<entry>
		<id>https://en.wiki4.bluespice.com/w/index.php?title=User:Mglaser&amp;diff=2951</id>
		<title>User:Mglaser</title>
		<link rel="alternate" type="text/html" href="https://en.wiki4.bluespice.com/w/index.php?title=User:Mglaser&amp;diff=2951"/>
		<updated>2022-03-24T10:29:15Z</updated>

		<summary type="html">&lt;p&gt;Mglaser: create user page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Userpage standard content}}&lt;/div&gt;</summary>
		<author><name>Mglaser</name></author>
	</entry>
</feed>