GHSA-2wcr-87wf-cf9j

Source
https://github.com/advisories/GHSA-2wcr-87wf-cf9j
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/03/GHSA-2wcr-87wf-cf9j/GHSA-2wcr-87wf-cf9j.json
Aliases
Published
2023-03-30T20:18:29Z
Modified
2023-11-08T04:12:05.035224Z
Details

Impact

Kiwi TCMS accepts SVG files uploaded by users which could potentially contain JavaScript code. If SVG images are viewed directly, i.e. not rendered in an HTML page, this JavaScript code could execute.

Patches

This vulnerability has been fixed by configuring Kiwi TCMS to serve with the Content-Security-Policy HTTP header which blocks inline JavaScript in all modern browsers.

Workarounds

Configure Content-Security-Policy header, see commit 6617cee0.

References

You can visit https://digi.ninja/blog/svg_xss.php for more technical details.

Independently disclosed by Antonio Spataro and @1d8.

References

Affected packages

PyPI / kiwitcms

Package

Name
kiwitcms

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0The exact introduced commit is unknown
Fixed
12.1

Affected versions

6.*

6.2.1
6.3
6.4
6.5
6.5.3
6.6
6.7
6.8
6.9
6.10
6.11

7.*

7.0
7.1
7.2
7.2.1
7.3

8.*

8.0
8.1
8.1.99
8.2
8.3
8.4
8.5
8.6
8.6.1
8.7
8.8
8.9

9.*

9.0
9.999

10.*

10.0
10.1
10.2
10.3
10.3.999
10.4
10.5

11.*

11.0
11.1
11.3
11.4
11.5
11.6
11.7

12.*

12.0