GHSA-6xcx-gx7r-rccj

Suggest an improvement
Source
https://github.com/advisories/GHSA-6xcx-gx7r-rccj
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/08/GHSA-6xcx-gx7r-rccj/GHSA-6xcx-gx7r-rccj.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-6xcx-gx7r-rccj
Aliases
Related
Published
2023-08-15T20:04:49Z
Modified
2024-02-16T08:21:49.137156Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
Scancode.io Reflected Cross-Site Scripting (XSS) in license endpoint
Details

Summary

In the /license/ endpoint, the detailed view key is not properly validated and sanitized, which can result in a potential cross-site scripting (XSS) vulnerability when attempting to access a detailed license view that does not exist.

Details

In the /license/ endpoint, the license_details_view function is vulnerable to a potential cross-site scripting (XSS) attack due to inadequate validation and sanitization of the key parameter. This vulnerability arises when attempting to access a key with malicious javascript.

def license_details_view(request, key):
    """
    Display all available information about a given license `key` followed by
    the full license text.
    """
    licenses = get_licenses()
    try:
        data = saneyaml.dump(licenses[key].to_dict())
        text = licenses[key].text
    except KeyError:
        return HttpResponseNotFound(f"License {key} not found.") # Leads to cross-site scripting when key is malicious javascript
    return HttpResponse(f"<pre>{data}</pre><hr><pre>{text}</pre>")

PoC

  1. Access following endpoint on scancode.io instance: http://localhost/license/%3Cscript%3Ealert(document.cookie);%3C/script%3E/

Impact

Attackers can exploit the vulnerability to inject malicious scripts into the response generated by the license_details_view function. When unsuspecting users visit the page, their browsers will execute the injected scripts, leading to unauthorized actions, session hijacking, or stealing sensitive information.

Database specific
{
    "github_reviewed_at": "2023-08-15T20:04:49Z",
    "cwe_ids": [
        "CWE-79"
    ],
    "nvd_published_at": "2023-08-14T20:15:12Z",
    "severity": "MODERATE",
    "github_reviewed": true
}
References

Affected packages

PyPI / scancodeio

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
32.5.2

Affected versions

32.*

32.0.1
32.1.0
32.2.0
32.4.0
32.5.0
32.5.1

Database specific

{
    "last_known_affected_version_range": "<= 32.5.1"
}