GHSA-5pxr-7m4j-jjc6

Suggest an improvement
Source
https://github.com/advisories/GHSA-5pxr-7m4j-jjc6
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/06/GHSA-5pxr-7m4j-jjc6/GHSA-5pxr-7m4j-jjc6.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-5pxr-7m4j-jjc6
Aliases
Published
2024-06-07T19:37:10Z
Modified
2024-06-07T19:59:12.658860Z
Severity
  • 4.8 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
Cross-site scripting (XSS) vulnerability in Description metadata
Details

Summary

Regardless of the role or privileges, no user should be able to inject malicious JavaScript (JS) scripts into the body HTML. an XSS (Cross-Site Scripting) vulnerability, specifically a Stored XSS, which affects all pages of the website. Once the JS script is embedded in the body HTML, the XSS will trigger on any page a victim visits, such as the about, blog, contact, or any other pages, except for the panel.

Impact

This vulnerability allows attackers to inject malicious JS or HTML through a crafted payload into the vulnerable spot, achieving persistence and attacking numerous visitors or anyone accessing the website. The attack can be widespread and affect many users because the malicious JS will execute on every page, unlike an injection on a specific page (e.g., injecting on the About page would only affect that page). In this case, a single injection point leads to the execution of the malicious JS on all pages.

Patches

Details

An attackers (requires administrator privilege) to execute arbitrary web scripts by modifying site options via /panel/options/site. This type of attack is suitable for persistence, affecting visitors across all pages (except the dashboard).

PoC

  1. Log in with an Administrator user account.
  2. Navigate to /panel/options/site/.
  3. Inject the JS script by adding to the description field.
  4. Simulate a victim who is not a site member visiting the website. You will notice that the JS script executes on every page they vis

image image image image

Database specific
{
    "nvd_published_at": "2024-06-07T14:15:10Z",
    "cwe_ids": [
        "CWE-79"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2024-06-07T19:37:10Z"
}
References

Affected packages

Packagist / getformwork/formwork

Package

Name
getformwork/formwork
Purl
pkg:composer/getformwork/formwork

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.13.1

Affected versions

0.*

0.6.9
0.6.10
0.6.11
0.6.12
0.7.0
0.7.1
0.7.2
0.8.0
0.8.1
0.9.0
0.9.1
0.9.2
0.9.3
0.9.4
0.9.5
0.9.6
0.10.0
0.10.1
0.10.2
0.10.3
0.10.4
0.10.5
0.11.0
0.11.1
0.11.2
0.12.0
0.12.1

1.*

1.0.0
1.1.0
1.1.1
1.2.0
1.2.1
1.3.0
1.3.1
1.4.0
1.4.1
1.4.2
1.4.3
1.4.4
1.4.5
1.4.6
1.4.7
1.5.0
1.5.1
1.5.2
1.6.0
1.6.1
1.7.0
1.7.1
1.8.0
1.9.0
1.9.1
1.10.0
1.10.1
1.10.2
1.10.3
1.11.0
1.11.1
1.12.0
1.12.1
1.13.0

Packagist / getformwork/formwork

Package

Name
getformwork/formwork
Purl
pkg:composer/getformwork/formwork

Affected ranges

Affected versions

2.*

2.0.0-beta.1