Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS0zaDd2LXdxdzctZmYyOM4AArCV
Cross site scripting in publify
In publify, versions v8.0 to v9.2.4 are vulnerable to stored XSS as a result of an unrestricted file upload. This issue allows a user with “publisher” role to inject malicious JavaScript via the uploaded html file.
Permalink: https://github.com/advisories/GHSA-3h7v-wqw7-ff28JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS0zaDd2LXdxdzctZmYyOM4AArCV
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 2 years ago
Updated: almost 2 years ago
CVSS Score: 5.4
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Identifiers: GHSA-3h7v-wqw7-ff28, CVE-2021-25975
References:
- https://nvd.nist.gov/vuln/detail/CVE-2021-25975
- https://github.com/publify/publify/commit/d99c0870d3dbbfde7febdc6cad33199b84770101
- https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25974
- https://github.com/advisories/GHSA-3h7v-wqw7-ff28
Blast Radius: 4.9
Affected Packages
rubygems:publify_core
Dependent packages: 2Dependent repositories: 8
Downloads: 34,701 total
Affected Version Ranges: >= 8.0, < 9.2.5
Fixed in: 9.2.5
All affected versions: 9.0.0, 9.0.1, 9.1.0, 9.2.0, 9.2.1, 9.2.2, 9.2.3, 9.2.4
All unaffected versions: 9.2.5, 9.2.6, 9.2.7, 9.2.8, 9.2.9, 9.2.10, 10.0.0, 10.0.1, 10.0.2