Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cq88-842x-2jhp

Опубликовано: 04 апр. 2025
Источник: github
Github: Прошло ревью
CVSS4: 4.8

Описание

Miniflux Media Proxy vulnerable to Stored Cross-site Scripting due to improper Content-Security-Policy configuration

Summary

Due to a weak Content Security Policy on the /proxy/* route, an attacker can bypass the CSP of the media proxy and execute cross-site scripting when opening external images in a new tab/window.

Impact

A malicious feed added to Miniflux can execute arbitrary JavaScript in the user's browser when opening external resources, such as proxified images, in a new tab or window.

Mitigation

The CSP for the media proxy has been changed from default-src 'self' to default-src 'none'; form-action 'none'; sandbox;.

Upgrade to Miniflux >= 2.2.7

Credit

RyotaK (GMO Flatt Security Inc.) with takumi-san.ai

Пакеты

Наименование

miniflux.app/v2

go
Затронутые версииВерсия исправления

< 2.2.7

2.2.7

EPSS

Процентиль: 50%
0.0027
Низкий

4.8 Medium

CVSS4

Дефекты

CWE-79

Связанные уязвимости

ubuntu
10 месяцев назад

Miniflux is a feed reader. Due to a weak Content Security Policy on the /proxy/* route, an attacker can bypass the CSP of the media proxy and execute cross-site scripting when opening external images in a new tab/window. To mitigate the vulnerability, the CSP for the media proxy has been changed from default-src 'self' to default-src 'none'; form-action 'none'; sandbox;. This vulnerability is fixed in 2.2.7.

nvd
10 месяцев назад

Miniflux is a feed reader. Due to a weak Content Security Policy on the /proxy/* route, an attacker can bypass the CSP of the media proxy and execute cross-site scripting when opening external images in a new tab/window. To mitigate the vulnerability, the CSP for the media proxy has been changed from default-src 'self' to default-src 'none'; form-action 'none'; sandbox;. This vulnerability is fixed in 2.2.7.

EPSS

Процентиль: 50%
0.0027
Низкий

4.8 Medium

CVSS4

Дефекты

CWE-79