GHSA-3244-8mff-w398

Suggest an improvement
Source
https://github.com/advisories/GHSA-3244-8mff-w398
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/01/GHSA-3244-8mff-w398/GHSA-3244-8mff-w398.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-3244-8mff-w398
Aliases
Published
2023-01-10T22:48:43Z
Modified
2024-08-20T20:59:19.120822Z
Summary
Reflected XSS in Gotify's /docs via import of outdated Swagger UI
Details

Impact

Gotify exposes an outdated instance of the Swagger UI API documentation frontend at /docs which is susceptible to reflected XSS attacks when loading external Swagger config files.

Specifically, the DOMPurify version included with this version of Swagger UI is vulnerable to a rendering XSS incorporating the mutation payload detailed in CVE-2020-26870 which was patched in 2021. This is further tracked in the GitHub Advisory Database as GHSA-QRMM-W75W-3WPX.

An attacker can execute arbitrary JavaScript and potentially take over the account of the user that clicked the link. Keep in mind, the Gotify UI won't natively expose such a malicious link, so an attacker has to get the user to open the malicious link in a context outside of Gotify.

Patches

The vulnerability has been fixed in version 2.2.3.

References

https://github.com/gotify/server/pull/541

Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [
        "CWE-79"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2023-01-10T22:48:43Z"
}
References

Affected packages

Go / github.com/gotify/server

Package

Name
github.com/gotify/server
View open source insights on deps.dev
Purl
pkg:golang/github.com/gotify/server

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.3

Database specific

{
    "last_known_affected_version_range": "<= 2.2.2"
}