AList is a file list program that supports multiple storages. AList contains a reflected cross-site scripting vulnerability in helper.go. The endpoint /i/:link_name takes in a user-provided value and reflects it back in the response. The endpoint returns an application/xml response, opening it up to HTML tags via XHTML and thus leading to a XSS vulnerability. This vulnerability is fixed in 3.29.0.
History

Fri, 15 Nov 2024 16:45:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Mon, 30 Sep 2024 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Alist Project
Alist Project alist
CPEs cpe:2.3:a:alist_project:alist:*:*:*:*:*:*:*:*
Vendors & Products Alist Project
Alist Project alist
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 30 Sep 2024 15:45:00 +0000

Type Values Removed Values Added
Description AList is a file list program that supports multiple storages. AList contains a reflected cross-site scripting vulnerability in helper.go. The endpoint /i/:link_name takes in a user-provided value and reflects it back in the response. The endpoint returns an application/xml response, opening it up to HTML tags via XHTML and thus leading to a XSS vulnerability. This vulnerability is fixed in 3.29.0.
Title Alist Contains a Reflected Cross-Site Scripting Vulnerability
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-09-30T15:39:28.219Z

Updated: 2024-09-30T17:24:16.581Z

Reserved: 2024-09-17T17:42:37.029Z

Link: CVE-2024-47067

cve-icon Vulnrichment

Updated: 2024-09-30T17:24:04.879Z

cve-icon NVD

Status : Analyzed

Published: 2024-09-30T16:15:09.267

Modified: 2024-11-15T16:28:48.533

Link: CVE-2024-47067

cve-icon Redhat

No data.