Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS0yaGZqLWN4dzctZzQ1cM0bRg

Unsafe inline XSS in pasting DOM element into chat

Impact

Inline scripts are executed when Javascript is parsed via a paste action.

  1. Open https://watch.owncast.online/
  2. Copy and then paste <img src=null onerror=alert('hello')> into the
    chat field.
  3. An alert should pop up.

Patches

    ⋮ 13 │    // Content security policy
    ⋮ 14 │    csp := []string{
    ⋮ 15 │        "script-src 'self' 'sha256-2HPCfJIJHnY0NrRDPTOdC7AOSJIcQyNxzUuut3TsYRY='",
    ⋮ 16 │        "worker-src 'self' blob:", // No single quotes around blob:
    ⋮ 17 │    }

Will be patched in 0.0.9 by blocking unsafe-inline Content Security Policy and specifying the script-src. The worker-src is required to be set to blob for the video player.

For more information

If you have any questions or comments about this advisory:

Permalink: https://github.com/advisories/GHSA-2hfj-cxw7-g45p
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS0yaGZqLWN4dzctZzQ1cM0bRg
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 2 years ago
Updated: about 1 year ago


CVSS Score: 8.2
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:L

Identifiers: GHSA-2hfj-cxw7-g45p, CVE-2021-39183
References: Repository: https://github.com/owncast/owncast
Blast Radius: 0.0

Affected Packages

go:github.com/owncast/owncast
Dependent packages: 1
Dependent repositories: 1
Downloads:
Affected Version Ranges: < 0.0.9
Fixed in: 0.0.9
All affected versions: 0.0.1, 0.0.2, 0.0.3, 0.0.4, 0.0.5, 0.0.6, 0.0.7, 0.0.8
All unaffected versions: 0.0.9, 0.0.10, 0.0.11, 0.0.12, 0.0.13, 0.1.0, 0.1.1, 0.1.2, 0.1.3