Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS02eGN4LWd4N3ItcmNjas4AA1Ui

Scancode.io Reflected Cross-Site Scripting (XSS) in license endpoint

Summary

In the /license/ endpoint, the detailed view key is not properly validated and sanitized, which can result in a potential cross-site scripting (XSS) vulnerability when attempting to access a detailed license view that does not exist.

Details

In the /license/ endpoint, the license_details_view function is vulnerable to a potential cross-site scripting (XSS) attack due to inadequate validation and sanitization of the key parameter. This vulnerability arises when attempting to access a key with malicious javascript.

def license_details_view(request, key):
    """
    Display all available information about a given license `key` followed by
    the full license text.
    """
    licenses = get_licenses()
    try:
        data = saneyaml.dump(licenses[key].to_dict())
        text = licenses[key].text
    except KeyError:
        return HttpResponseNotFound(f"License {key} not found.") # Leads to cross-site scripting when key is malicious javascript
    return HttpResponse(f"<pre>{data}</pre><hr><pre>{text}</pre>")

PoC

  1. Access following endpoint on scancode.io instance: http://localhost/license/%3Cscript%3Ealert(document.cookie);%3C/script%3E/

Impact

Attackers can exploit the vulnerability to inject malicious scripts into the response generated by the license_details_view function. When unsuspecting users visit the page, their browsers will execute the injected scripts, leading to unauthorized actions, session hijacking, or stealing sensitive information.

Permalink: https://github.com/advisories/GHSA-6xcx-gx7r-rccj
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS02eGN4LWd4N3ItcmNjas4AA1Ui
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 9 months ago
Updated: 6 months ago


CVSS Score: 6.1
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Identifiers: GHSA-6xcx-gx7r-rccj, CVE-2023-40024
References: Repository: https://github.com/nexB/scancode.io
Blast Radius: 1.0

Affected Packages

pypi:scancodeio
Dependent packages: 0
Dependent repositories: 0
Downloads: 511 last month
Affected Version Ranges: <= 32.5.1
Fixed in: 32.5.2
All affected versions: 32.0.1, 32.1.0, 32.2.0, 32.4.0, 32.5.0, 32.5.1
All unaffected versions: 32.5.2, 32.6.0, 32.7.0, 33.0.0, 33.1.0, 34.0.0, 34.1.0, 34.2.0, 34.3.0, 34.4.0