GHSA-rrqf-w74j-24ff

Suggest an improvement
Source
https://github.com/advisories/GHSA-rrqf-w74j-24ff
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/09/GHSA-rrqf-w74j-24ff/GHSA-rrqf-w74j-24ff.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-rrqf-w74j-24ff
Aliases
Published
2024-09-04T17:19:14Z
Modified
2024-09-25T18:03:00.150978Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
  • 5.1 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
Indico has a Cross-Site-Scripting during account creation
Details

Impact

There is a Cross-Site-Scripting vulnerability during account creation when redirecting after the account has been successfully created. Exploitation requires the user to initiate the account creation process with a maliciously crafted link, and then finalize the signup process. Because of this, it can only target newly created (and thus unprivileged) Indico users so the benefits of exploiting it are very limited.

Patches

You should to update to Indico 3.3.4 as soon as possible. See the docs for instructions on how to update.

Workarounds

  • If you build the Indico package yourself and cannot upgrade for some reason, you can simply update the flask-multipass dependency to >=0.5.5 which fixes the vulnerability. You would do that by editing requirements.txt before building the package (see commit 7dcb573837), or possibly cherry-picking that particular commit.
  • Otherwise you could configure your web server to disallow requests containing a query string with a parameter that starts with javascript:

For more information

If you have any questions or comments about this advisory:

Database specific
{
    "nvd_published_at": "2024-09-04T20:15:09Z",
    "cwe_ids": [
        "CWE-1395",
        "CWE-79"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2024-09-04T17:19:14Z"
}
References

Affected packages

PyPI / indico

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.3.4

Affected versions

0.*

0.98-rc1
0.98.0
0.98.1
0.98.2
0.99

1.*

1.0
1.1
1.1.1
1.1.2
1.2
1.2.1rc2
1.2.1rc4
1.2.1rc5
1.2.1rc6
1.2.1rc7
1.2.1rc9
1.2.1rc10
1.2.1rc11
1.2.1
1.2.2rc1
1.2.2
1.9.11.dev3
1.9.11.dev4
1.9.11.dev6
1.9.11.dev7
1.9.11.dev8
1.9.11.dev9
1.9.11.dev10
1.9.11.dev11
1.9.11.dev12
1.9.11.dev13
1.9.11.dev14
1.9.11.dev15
1.9.11.dev16
1.9.11.dev17

2.*

2.0a1
2.0rc1
2.0rc2
2.0
2.0.1
2.0.2
2.0.3
2.1
2.1.1
2.1.2
2.1.3
2.1.4
2.1.5
2.1.6
2.1.7
2.1.8
2.1.9
2.1.10
2.1.11
2.2
2.2.1
2.2.2
2.2.3
2.2.4
2.2.5
2.2.6
2.2.7
2.2.8
2.3
2.3.1
2.3.2
2.3.3
2.3.4
2.3.5

3.*

3.0rc1
3.0rc2
3.0
3.0.1
3.0.2
3.0.3
3.1
3.1.1
3.2
3.2.1
3.2.2
3.2.3
3.2.4
3.2.5
3.2.6
3.2.7
3.2.8
3.2.9
3.3
3.3.1
3.3.2
3.3.3