Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS0yd2NyLTg3d2YtY2Y5as4AAyds

Kiwi TCMS Stored Cross-site Scripting via SVG file

Impact

Kiwi TCMS accepts SVG files uploaded by users which could potentially contain JavaScript code. If SVG images are viewed directly, i.e. not rendered in an HTML page, this JavaScript code could execute.

Patches

This vulnerability has been fixed by configuring Kiwi TCMS to serve with the Content-Security-Policy HTTP header which blocks inline JavaScript in all modern browsers.

Workarounds

Configure Content-Security-Policy header, see commit 6617cee0.

References

You can visit https://digi.ninja/blog/svg_xss.php for more technical details.

Independently disclosed by Antonio Spataro and @1d8.

Permalink: https://github.com/advisories/GHSA-2wcr-87wf-cf9j
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS0yd2NyLTg3d2YtY2Y5as4AAyds
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 12 months ago
Updated: 12 months ago


CVSS Score: 7.6
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L

Identifiers: GHSA-2wcr-87wf-cf9j, CVE-2023-27489
References: Repository: https://github.com/kiwitcms/Kiwi

Affected Packages

pypi:kiwitcms
Dependent packages: 0
Dependent repositories: 1
Downloads: 1,177 last month
Affected Version Ranges: < 12.1
Fixed in: 12.1
All affected versions: 6.2.1, 6.5.3, 7.2.1, 8.1.99, 8.6.1, 10.3.999
All unaffected versions: