Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rrqf-w74j-24ff

Опубликовано: 04 сент. 2024
Источник: github
Github: Прошло ревью
CVSS4: 5.1
CVSS3: 6.1

Описание

Indico has a Cross-Site-Scripting during account creation

Impact

There is a Cross-Site-Scripting vulnerability during account creation when redirecting after the account has been successfully created. Exploitation requires the user to initiate the account creation process with a maliciously crafted link, and then finalize the signup process. Because of this, it can only target newly created (and thus unprivileged) Indico users so the benefits of exploiting it are very limited.

Patches

You should to update to Indico 3.3.4 as soon as possible. See the docs for instructions on how to update.

Workarounds

  • If you build the Indico package yourself and cannot upgrade for some reason, you can simply update the flask-multipass dependency to >=0.5.5 which fixes the vulnerability. You would do that by editing requirements.txt before building the package (see commit 7dcb573837), or possibly cherry-picking that particular commit.
  • Otherwise you could configure your web server to disallow requests containing a query string with a parameter that starts with javascript:

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

indico

pip
Затронутые версииВерсия исправления

< 3.3.4

3.3.4

EPSS

Процентиль: 74%
0.00809
Низкий

5.1 Medium

CVSS4

6.1 Medium

CVSS3

Дефекты

CWE-1395
CWE-79

Связанные уязвимости

CVSS3: 4.3
nvd
больше 1 года назад

Indico is an event management system that uses Flask-Multipass, a multi-backend authentication system for Flask. In Indico prior to version 3.3.4, corresponding to Flask-Multipass prior to version 0.5.5, there is a Cross-Site-Scripting vulnerability during account creation when redirecting to the `next` URL. Exploitation requires initiating the account creation process with a maliciously crafted link, and then finalizing the signup process. Because of this, it can only target newly created (and thus unprivileged) Indico users. Indico 3.3.4 upgrades the dependency on Flask-Multipass to version 0.5.5, which fixes the issue. Those who build the Indico package themselves and cannot upgrade can update the `flask-multipass` dependency to `>=0.5.5` which fixes the vulnerability. Otherwise one could configure one's web server to disallow requests containing a query string with a `next` parameter that starts with `javascript:`.

EPSS

Процентиль: 74%
0.00809
Низкий

5.1 Medium

CVSS4

6.1 Medium

CVSS3

Дефекты

CWE-1395
CWE-79