Описание
In PrivateBin versions 1.2.0 before 1.2.2, and 1.3.0 before 1.3.2, a persistent XSS attack is possible. Under certain conditions, a user provided attachment file name can inject HTML leading to a persistent Cross-site scripting (XSS) vulnerability. The vulnerability has been fixed in PrivateBin v1.3.2 & v1.2.2. Admins are urged to upgrade to these versions to protect the affected users.
Ссылки
- Patch
- Third Party Advisory
- ExploitThird Party Advisory
- Release NotesVendor Advisory
- Patch
- Third Party Advisory
- ExploitThird Party Advisory
- Release NotesVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 1.2 (включая) до 1.2.2 (исключая)Версия от 1.3 (включая) до 1.3.2 (исключая)
Одно из
cpe:2.3:a:privatebin:privatebin:*:*:*:*:*:*:*:*
cpe:2.3:a:privatebin:privatebin:*:*:*:*:*:*:*:*
EPSS
Процентиль: 63%
0.00453
Низкий
6.1 Medium
CVSS3
4.4 Medium
CVSS3
2.1 Low
CVSS2
Дефекты
CWE-79
CWE-79
Связанные уязвимости
CVSS3: 6.1
github
около 6 лет назад
Persistent XSS vulnerability in filename of attached file in PrivateBin
EPSS
Процентиль: 63%
0.00453
Низкий
6.1 Medium
CVSS3
4.4 Medium
CVSS3
2.1 Low
CVSS2
Дефекты
CWE-79
CWE-79