Description
The csaf_provider package before 0.8.2 allows XSS via a crafted CSAF document uploaded as text/html. The endpoint upload allows valid CSAF advisories (JSON format) to be uploaded with Content-Type text/html and filenames ending in .html. When subsequently accessed via web browser, these advisories are served and interpreted as HTML pages. Such uploaded advisories can contain JavaScript code that will execute within the browser context of users inspecting the advisory.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7779 | csaf-poc/csaf_distribution Cross-site Scripting vulnerability |
Github GHSA |
GHSA-xxfx-w2rw-gh63 | csaf-poc/csaf_distribution Cross-site Scripting vulnerability |
References
History
Tue, 22 Apr 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-04-22T15:10:58.311Z
Reserved: 2022-10-29T00:00:00.000Z
Link: CVE-2022-43996
Updated: 2024-08-03T13:47:04.593Z
Status : Modified
Published: 2022-12-13T22:15:10.247
Modified: 2025-04-22T15:16:04.453
Link: CVE-2022-43996
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA