GHSA-pr5m-4w22-8483

Suggest an improvement
Source
https://github.com/advisories/GHSA-pr5m-4w22-8483
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/02/GHSA-pr5m-4w22-8483/GHSA-pr5m-4w22-8483.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-pr5m-4w22-8483
Aliases
Published
2021-02-25T16:32:34Z
Modified
2024-12-01T05:47:55.910898Z
Summary
NanoHTTPD Cross-site Scripting vulnerability
Details

An issue was discovered in RouterNanoHTTPD.java in NanoHTTPD through 2.3.1. The GeneralHandler class implements a basic GET handler that prints debug information as an HTML page. Any web server that extends this class without implementing its own GET handler is vulnerable to reflected XSS, because the GeneralHandler GET handler prints user input passed through the query string without any sanitization.

Database specific
{
    "nvd_published_at": "2021-02-23T08:15:00Z",
    "cwe_ids": [
        "CWE-79"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2021-02-24T07:10:37Z"
}
References

Affected packages

Maven / org.nanohttpd:nanohttpd-nanolets

Package

Name
org.nanohttpd:nanohttpd-nanolets
View open source insights on deps.dev
Purl
pkg:maven/org.nanohttpd/nanohttpd-nanolets

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
2.3.1

Affected versions

2.*

2.2.0
2.3.0
2.3.1