CVE-2022-43996

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-43996
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-43996.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-43996
Aliases
Published
2022-12-13T22:15:10Z
Modified
2025-01-08T09:13:17.382115Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

The csaf_provider package before 0.8.2 allows XSS via a crafted CSAF document uploaded as text/html. The endpoint upload allows valid CSAF advisories (JSON format) to be uploaded with Content-Type text/html and filenames ending in .html. When subsequently accessed via web browser, these advisories are served and interpreted as HTML pages. Such uploaded advisories can contain JavaScript code that will execute within the browser context of users inspecting the advisory.

References

Affected packages

Git / github.com/csaf-poc/csaf_distribution

Affected ranges

Type
GIT
Repo
https://github.com/csaf-poc/csaf_distribution
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.1.0-alpha.1
v0.2.0
v0.3.0
v0.8.0
v0.8.1