Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8fm5-gg2f-f66q

Опубликовано: 28 мар. 2025
Источник: github
Github: Прошло ревью
CVSS4: 1.8

Описание

Publify Vulnerable To Cross-Site Scripting (XSS) Via Redirects Requiring User Interaction

Summary

A publisher on a publify application is able to perform a cross-site scripting attack on an administrator using the redirect functionality.

Details

A publisher on a publify application is able to perform a cross-site scripting attack on an administrator using the redirect functionality. The exploitation of this XSS vulnerability requires the administrator to click a malicious link.

We can create a redirect to a javascript:alert() URL. Whilst the redirect itself doesn't work, on the administrative panel, an a tag is created with the payload as the URI. Upon clicking this link, the XSS is triggered.

An attack could attempt to hide their payload by using HTML, or other encodings, as to not make it obvious to an administrator that this is a malicious link.

PoC

A publisher can create a new redirect as shown below. The payload used is javascript:alert(). image

An administrator will now see this redirect in their overview of the page. image

If they click the link on the right, it triggers the XSS. image

Impact

A publisher may attempt to use this vulnerability to escalate their privileges and become an administrator.

Пакеты

Наименование

publify_core

rubygems
Затронутые версииВерсия исправления

< 10.0.2

10.0.2

EPSS

Процентиль: 34%
0.0014
Низкий

1.8 Low

CVSS4

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 5.4
nvd
11 месяцев назад

Publify is a self hosted Web publishing platform on Rails. Prior to version 10.0.1 of Publify, corresponding to versions prior to 10.0.2 of the `publify_core` rubygem, publisher on a `publify` application is able to perform a cross-site scripting (XSS) attack on an administrator using the redirect functionality. The exploitation of this XSS vulnerability requires the administrator to click a malicious link. An attack could attempt to hide their payload by using HTML, or other encodings, as to not make it obvious to an administrator that this is a malicious link. A publisher may attempt to use this vulnerability to escalate their privileges and become an administrator. Version 10.0.1 of Publify and version 10.0.2 of the `publify_core` rubygem fix the issue.

EPSS

Процентиль: 34%
0.0014
Низкий

1.8 Low

CVSS4

Дефекты

CWE-79