GHSA-rm89-9g65-4ffr

Suggest an improvement
Source
https://github.com/advisories/GHSA-rm89-9g65-4ffr
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/06/GHSA-rm89-9g65-4ffr/GHSA-rm89-9g65-4ffr.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-rm89-9g65-4ffr
Published
2022-06-17T01:16:36Z
Modified
2024-12-08T05:43:58.178026Z
Summary
Insufficient HTML Sanitization
Details

Impact

Affected versions can have malicious javascript code injected into the users browser by other authenticated users, as data fields retrieved from the database are not properly sanitized before displaying in various front-end views.

The problem here stems from multiple issues:

  • Insufficient database sanitation on multiple fields allows injection of un-sanitized HTML
  • Lack of HTML escaping when rendering data on the front end

The attack vector here is limited, as only authenticated users are able to write data to the database, for it to be subsequently rendered on the front-end. However, it is a vulnerability that the InvenTree development team takes seriously.

Solution

The proposed patch for this vulnerability is prevents injection of un-escaped fields into front-end UI elements.

A future patch will also address sanitization of database fields on the "back end", however this will require a much larger effort to refactor multiple database tables.

Patches

  • The issue is addressed in the upcoming 0.8.0 release
  • This fix will also be back-ported to the 0.7.x branch, applied to the 0.7.2 release

Workarounds

There are no workarounds for this issue, users should upgrade to a patched version.

References

  • https://huntr.dev/bounties/4cae8442-c042-43c2-ad89-6f666eaf3d57/
  • https://huntr.dev/bounties/9d640ef2-c52c-4106-b043-f7497d577078/
  • https://huntr.dev/bounties/b114e82f-6c02-485b-82ea-e242f89169c2/
  • https://huntr.dev/bounties/22783cd3-1b2c-48fc-b31f-03b53c86da0b/

Thank you @saharshtapi for bringing this issue to our attention and giving pointers for fixing them.

For more information

If you have any questions or comments about this advisory:

Database specific
{
    "severity": "HIGH",
    "nvd_published_at": null,
    "github_reviewed_at": "2022-06-17T01:16:36Z",
    "github_reviewed": true,
    "cwe_ids": []
}
References

Affected packages

PyPI / inventree

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.7.2

Affected versions

0.*

0.0.1
0.0.2
0.0.3
0.0.4
0.0.5
0.0.6
0.0.7
0.0.8
0.0.9
0.1.0
0.1.1
0.1.2
0.1.3
0.1.4
0.2.4
0.3.1
0.3.2
0.4.4
0.6.0
0.6.1
0.7.0
0.7.1