Описание
Decidim cross-site scripting (XSS) in the pagination
Impact
The pagination feature used in searches and filters is subject to potential XSS attack through a malformed URL using the GET parameter per_page.
Patches
Not available
Workarounds
Not available
References
OWASP ASVS v4.0.3-5.1.3
Credits
This issue was discovered in a security audit organized by the mitgestalten Partizipationsbüro and funded by netidee against Decidim done during April 2024. The security audit was implemented by AIT Austrian Institute of Technology GmbH,
Ссылки
- https://github.com/decidim/decidim/security/advisories/GHSA-7cx8-44pc-xv3q
- https://nvd.nist.gov/vuln/detail/CVE-2024-32469
- https://github.com/decidim/decidim/releases/tag/v0.27.6
- https://github.com/decidim/decidim/releases/tag/v0.28.1
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/decidim/CVE-2024-32469.yml
Пакеты
decidim
< 0.27.6
0.27.6
decidim
>= 0.28.0.rc1, < 0.28.1
0.28.1
Связанные уязвимости
Decidim is a participatory democracy framework. The pagination feature used in searches and filters is subject to potential XSS attack through a malformed URL using the GET parameter `per_page`. This vulnerability is fixed in 0.27.6 and 0.28.1.