GHSA-xxfx-w2rw-gh63

Suggest an improvement
Source
https://github.com/advisories/GHSA-xxfx-w2rw-gh63
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/12/GHSA-xxfx-w2rw-gh63/GHSA-xxfx-w2rw-gh63.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-xxfx-w2rw-gh63
Aliases
Published
2022-12-14T00:30:23Z
Modified
2024-08-21T16:29:13.918453Z
Summary
csaf-poc/csaf_distribution Cross-site Scripting vulnerability
Details

The csaf_provider package before 0.8.2 allows XSS via a crafted CSAF document uploaded as text/html. The endpoint upload allows valid CSAF advisories (JSON format) to be uploaded with Content-Type text/html and filenames ending in .html. When subsequently accessed via web browser, these advisories are served and interpreted as HTML pages. Such uploaded advisories can contain JavaScript code that will execute within the browser context of users inspecting the advisory.

Database specific
{
    "nvd_published_at": "2022-12-13T22:15:00Z",
    "cwe_ids": [
        "CWE-79"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2022-12-14T14:06:08Z"
}
References

Affected packages

Go / github.com/csaf-poc/csaf_distribution

Package

Name
github.com/csaf-poc/csaf_distribution
View open source insights on deps.dev
Purl
pkg:golang/github.com/csaf-poc/csaf_distribution

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.8.2