Lucene search

K
githubGitHub Advisory DatabaseGHSA-XXFX-W2RW-GH63
HistoryDec 14, 2022 - 12:30 a.m.

csaf-poc/csaf_distribution Cross-site Scripting vulnerability

2022-12-1400:30:23
CWE-79
GitHub Advisory Database
github.com
3
csaf_provider package
cross-site scripting
advisory upload
html pages
javascript code
software

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

23.0%

The csaf_provider package before 0.8.2 allows XSS via a crafted CSAF document uploaded as text/html. The endpoint upload allows valid CSAF advisories (JSON format) to be uploaded with Content-Type text/html and filenames ending in .html. When subsequently accessed via web browser, these advisories are served and interpreted as HTML pages. Such uploaded advisories can contain JavaScript code that will execute within the browser context of users inspecting the advisory.

Affected configurations

Vulners
Node
csaf-poccsaf_distributionRange<0.8.2
VendorProductVersionCPE
csaf-poccsaf_distribution*cpe:2.3:a:csaf-poc:csaf_distribution:*:*:*:*:*:*:*:*

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

23.0%

Related for GHSA-XXFX-W2RW-GH63