GHSA-j9m2-6hq2-4r3c

Suggest an improvement
Source
https://github.com/advisories/GHSA-j9m2-6hq2-4r3c
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/07/GHSA-j9m2-6hq2-4r3c/GHSA-j9m2-6hq2-4r3c.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-j9m2-6hq2-4r3c
Aliases
Published
2019-07-16T00:52:22Z
Modified
2024-09-23T17:08:49.420891Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
  • 5.3 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N CVSS Calculator
Summary
Cross-site Scripting in invenio-previewer
Details

Cross-Site Scripting (XSS) vulnerability in JSON, Markdown and iPython Notebook previewers

Impact

Several Cross-Site Scripting (XSS) vulnerabilities have been found in the JSON, Markdown and iPython Notebook previewers. The vulnerabilities would allow a malicous user to upload a JSON, Markdown or Notebook file with embedded scripts that would be executed by a victims browser.

Patches

Invenio-Previewer v1.0.0a12 fixes the issue.

Workarounds

You can remediate the vulnerability without upgrading by disabling the affected previewers. You do this by adding the following to your configuration:

PREVIEWER_PREFERENCE = [
    'csv_dthreejs',
    'simple_image',
    # 'json_prismjs',
    'xml_prismjs',
    # 'mistune',
    'pdfjs',
    # 'ipynb',
    'zip',
]

Afterwards, you should not be able to preview JSON, Markdown or iPython Notebook files.

For more information

If you have any questions or comments about this advisory: * Email us at info@inveniosoftware.org

References

Affected packages

PyPI / invenio-previewer

Package

Name
invenio-previewer
View open source insights on deps.dev
Purl
pkg:pypi/invenio-previewer

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.0a12

Affected versions

0.*

0.1.0

1.*

1.0.0a2
1.0.0a3
1.0.0a4
1.0.0a5
1.0.0a6
1.0.0a7
1.0.0a8
1.0.0a9
1.0.0a10
1.0.0a11

Database specific

{
    "last_known_affected_version_range": "<= 1.0.0a11"
}