The csaf_provider package before 0.8.2 allows XSS via a crafted CSAF document uploaded as text/html. The endpoint upload allows valid CSAF advisories (JSON format) to be uploaded with Content-Type text/html and filenames ending in .html. When subsequently accessed via web browser, these advisories are served and interpreted as HTML pages. Such uploaded advisories can contain JavaScript code that will execute within the browser context of users inspecting the advisory.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7779 | csaf-poc/csaf_distribution Cross-site Scripting vulnerability |
Github GHSA |
GHSA-xxfx-w2rw-gh63 | csaf-poc/csaf_distribution Cross-site Scripting vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 22 Apr 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-04-22T15:10:58.311Z
Reserved: 2022-10-29T00:00:00.000Z
Link: CVE-2022-43996
Updated: 2024-08-03T13:47:04.593Z
Status : Modified
Published: 2022-12-13T22:15:10.247
Modified: 2025-04-22T15:16:04.453
Link: CVE-2022-43996
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA