Lucene search

K
githubGitHub Advisory DatabaseGHSA-78VG-7V27-HJ67
HistorySep 10, 2024 - 3:53 p.m.

auditor-bundle vulnerable to Cross-site Scripting because name of entity does not get escaped

2024-09-1015:53:10
CWE-79
GitHub Advisory Database
github.com
2
cross-site scripting
twig macro
javascript injection
example project
persistent xss
entity property
security vulnerability
demo project.

CVSS3

8.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L

AI Score

6.8

Confidence

High

EPSS

0.001

Percentile

21.3%

Summary

Unescaped entity property enables Javascript injection.

Details

I think this is possible because %source_label% in twig macro is not escaped. Therefore script tags can be inserted and are executed.

PoC

Impact

persistent XSS. JS can be injected and executed.

Affected configurations

Vulners
Node
damienharperauditor-bundleRange<5.2.6
VendorProductVersionCPE
damienharperauditor-bundle*cpe:2.3:a:damienharper:auditor-bundle:*:*:*:*:*:*:*:*

CVSS3

8.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L

AI Score

6.8

Confidence

High

EPSS

0.001

Percentile

21.3%

Related for GHSA-78VG-7V27-HJ67