Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vh22-6c6h-rm8q

Опубликовано: 13 янв. 2025
Источник: github
Github: Прошло ревью
CVSS3: 6.1

Описание

jte's HTML templates containing Javascript template strings are subject to XSS

Summary

Jte HTML templates with script tags or script attributes that include a Javascript template string (backticks) are subject to XSS.

Details

The javaScriptBlock and javaScriptAttribute methods in the Escape class (source) do not escape backticks, which are used for Javascript template strings. Dollar signs in template strings should also be escaped as well to prevent undesired interpolation.

PoC

  1. Use the Jte Gradle Plugin with the following code in src/jte/xss.jte:
    @param String someMessage <!DOCTYPE html> <html lang="en"> <head> <title>XSS Test</title> <script>window.someVariable = `${someMessage}`;</script> </head> <body> <h1>XSS Test</h1> </body> </html>
  2. Use the following Java code to demonstrate the XSS vulnerability:
    final StringOutput output = new StringOutput(); JtexssGenerated.render(new OwaspHtmlTemplateOutput(output), null, "` + alert(`xss`) + `"); renderHtml(output);

Impact

HTML templates rendered by Jte's OwaspHtmlTemplateOutput in versions less than or equal to 3.1.15 with script tags or script attributes that contain Javascript template strings (backticks) are vulnerable.

Пакеты

Наименование

gg.jte:jte

maven
Затронутые версииВерсия исправления

<= 3.1.15

3.1.16

Наименование

gg.jte:jte-runtime

maven
Затронутые версииВерсия исправления

<= 3.1.15

3.1.16

EPSS

Процентиль: 27%
0.00098
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-150
CWE-79

Связанные уязвимости

CVSS3: 6.1
nvd
около 1 года назад

jte (Java Template Engine) is a secure and lightweight template engine for Java and Kotlin. In affected versions Jte HTML templates with `script` tags or script attributes that include a Javascript template string (backticks) are subject to XSS. The `javaScriptBlock` and `javaScriptAttribute` methods in the `Escape` class do not escape backticks, which are used for Javascript template strings. Dollar signs in template strings should also be escaped as well to prevent undesired interpolation. HTML templates rendered by Jte's `OwaspHtmlTemplateOutput` in versions less than or equal to `3.1.15` with `script` tags or script attributes that contain Javascript template strings (backticks) are vulnerable. Users are advised to upgrade to version 3.1.16 or later to resolve this issue. There are no known workarounds for this vulnerability.

EPSS

Процентиль: 27%
0.00098
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-150
CWE-79