CVE-2020-5223

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2020-5223
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-5223.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-5223
Aliases
Published
2020-01-23T02:15:13Z
Modified
2024-05-30T02:42:03.389558Z
Severity
  • 4.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

In PrivateBin versions 1.2.0 before 1.2.2, and 1.3.0 before 1.3.2, a persistent XSS attack is possible. Under certain conditions, a user provided attachment file name can inject HTML leading to a persistent Cross-site scripting (XSS) vulnerability. The vulnerability has been fixed in PrivateBin v1.3.2 & v1.2.2. Admins are urged to upgrade to these versions to protect the affected users.

References

Affected packages

Git / github.com/privatebin/privatebin

Affected ranges

Type
GIT
Repo
https://github.com/privatebin/privatebin
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.18
0.19
0.20
0.21
0.21.1
0.22

1.*

1.0
1.1
1.2
1.2.1
1.3
1.3.1