Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS02eGN4LWd4N3ItcmNjas4AA1Ui
Scancode.io Reflected Cross-Site Scripting (XSS) in license endpoint
Summary
In the /license/
endpoint, the detailed view key is not properly validated and sanitized, which can result in a potential cross-site scripting (XSS) vulnerability when attempting to access a detailed license view that does not exist.
Details
In the /license/
endpoint, the license_details_view
function is vulnerable to a potential cross-site scripting (XSS) attack due to inadequate validation and sanitization of the key
parameter. This vulnerability arises when attempting to access a key with malicious javascript.
def license_details_view(request, key):
"""
Display all available information about a given license `key` followed by
the full license text.
"""
licenses = get_licenses()
try:
data = saneyaml.dump(licenses[key].to_dict())
text = licenses[key].text
except KeyError:
return HttpResponseNotFound(f"License {key} not found.") # Leads to cross-site scripting when key is malicious javascript
return HttpResponse(f"<pre>{data}</pre><hr><pre>{text}</pre>")
PoC
- Access following endpoint on scancode.io instance: http://localhost/license/%3Cscript%3Ealert(document.cookie);%3C/script%3E/
Impact
Attackers can exploit the vulnerability to inject malicious scripts into the response generated by the license_details_view
function. When unsuspecting users visit the page, their browsers will execute the injected scripts, leading to unauthorized actions, session hijacking, or stealing sensitive information.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS02eGN4LWd4N3ItcmNjas4AA1Ui
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 9 months ago
Updated: 6 months ago
CVSS Score: 6.1
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Identifiers: GHSA-6xcx-gx7r-rccj, CVE-2023-40024
References:
- https://github.com/nexB/scancode.io/security/advisories/GHSA-6xcx-gx7r-rccj
- https://nvd.nist.gov/vuln/detail/CVE-2023-40024
- https://github.com/nexB/scancode.io/blob/dd7769fbc97c84545579cebf1dc4838214098a11/CHANGELOG.rst#v3252-2023-08-14
- https://github.com/nexB/scancode.io/releases/tag/v32.5.2
- https://github.com/advisories/GHSA-6xcx-gx7r-rccj
Blast Radius: 1.0
Affected Packages
pypi:scancodeio
Dependent packages: 0Dependent repositories: 0
Downloads: 511 last month
Affected Version Ranges: <= 32.5.1
Fixed in: 32.5.2
All affected versions: 32.0.1, 32.1.0, 32.2.0, 32.4.0, 32.5.0, 32.5.1
All unaffected versions: 32.5.2, 32.6.0, 32.7.0, 33.0.0, 33.1.0, 34.0.0, 34.1.0, 34.2.0, 34.3.0, 34.4.0