Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1jcjQ1LTk4dzktZ3dxeM4AA2kE
Viewing wget extractor output while logged in as an admin allows archived JS to execute in the admins context
Impact
Any users who are using the wget
or dom
extractors and view the content they output.
The impact is potentially severe if you are logged in to the ArchiveBox admin site in the same browser session and view an archived malicious page designed to target your ArchiveBox instance. Malicious JS could potentially act using your logged-in admin credentials and add/remove/modify snapshots, add/remove/modify ArchiveBox users, and generally do anything an admin user could do.
The impact is less severe for non-logged-in users, as malicious JS cannot modify any archives, but it can still read all the other archived content by fetching the snapshot index and iterating through it.
Because all of ArchiveBox's archived content is served from the same host and port as the admin panel, when archived pages are viewed the JS executes in the same context as all the other archived pages (and the admin panel), defeating most of the browser's usual CORS/CSRF security protections and leading to this issue.
Patches
Follow here for progress on mitigating this issue: https://github.com/ArchiveBox/ArchiveBox/issues/239
Workarounds
Disable the risky extractors by setting archivebox config --set SAVE_WGET=False SAVE_DOM=False
, ensure you are always logged out, or serve only a static HTML version of your archive.
References
- https://en.wikipedia.org/wiki/Cross-site_request_forgery
- https://github.com/ArchiveBox/ArchiveBox#caveats
- https://github.com/ArchiveBox/ArchiveBox/wiki/Security-Overview
- https://github.com/ArchiveBox/ArchiveBox/wiki/Publishing-Your-Archive#security-concerns
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1jcjQ1LTk4dzktZ3dxeM4AA2kE
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 1 year ago
Updated: 16 days ago
CVSS Score: 6.4
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N
EPSS Percentage: 0.00056
EPSS Percentile: 0.24555
Identifiers: GHSA-cr45-98w9-gwqx, CVE-2023-45815
References:
- https://github.com/ArchiveBox/ArchiveBox/security/advisories/GHSA-cr45-98w9-gwqx
- https://github.com/ArchiveBox/ArchiveBox/issues/239
- https://en.wikipedia.org/wiki/Cross-site_request_forgery
- https://github.com/ArchiveBox/ArchiveBox#caveats
- https://github.com/ArchiveBox/ArchiveBox/wiki/Configuration#save_wget
- https://github.com/ArchiveBox/ArchiveBox/wiki/Publishing-Your-Archive#2-export-and-host-it-as-static-html
- https://github.com/ArchiveBox/ArchiveBox/wiki/Publishing-Your-Archive#security-concerns
- https://github.com/ArchiveBox/ArchiveBox/wiki/Security-Overview
- https://nvd.nist.gov/vuln/detail/CVE-2023-45815
- https://github.com/pypa/advisory-database/tree/main/vulns/archivebox/PYSEC-2023-229.yaml
- https://github.com/advisories/GHSA-cr45-98w9-gwqx
Blast Radius: 3.9
Affected Packages
pypi:archivebox
Dependent packages: 0Dependent repositories: 4
Downloads: 69,057 last month
Affected Version Ranges: <= 0.6.2
No known fixed version
All affected versions: 0.4.6, 0.4.8, 0.4.9, 0.4.11, 0.4.12, 0.4.13, 0.4.14, 0.4.15, 0.4.16, 0.4.17, 0.4.18, 0.4.19, 0.4.20, 0.4.21, 0.5.0, 0.5.1, 0.5.2, 0.5.3, 0.5.4, 0.6.0, 0.6.1, 0.6.2