Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1nMnZnLThoZmctNzl2as4ABCrg

Koji Cross-site Scripting

A vulnerability in Koji was found. An unsanitized input allows for an XSS attack. Javascript code from a malicious link could be reflected in the resulting web page. It is not expected to be able to submit an action or make a change in Koji due to existing XSS protections in the code.

Permalink: https://github.com/advisories/GHSA-g2vg-8hfg-79vj
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1nMnZnLThoZmctNzl2as4ABCrg
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 16 days ago
Updated: 13 days ago


CVSS Score: 5.4
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

EPSS Percentage: 0.00045
EPSS Percentile: 0.15621

Identifiers: GHSA-g2vg-8hfg-79vj, CVE-2024-9427
References: Blast Radius: 10.7

Affected Packages

pypi:koji
Dependent packages: 12
Dependent repositories: 95
Downloads: 18,614 last month
Affected Version Ranges: < 1.33.2, >= 1.34.0, < 1.34.3, = 1.35.0
Fixed in: 1.33.2, 1.34.3, 1.35.1
All affected versions: 1.15.0, 1.16.0, 1.16.1, 1.17.0, 1.18.0, 1.19.0, 1.19.1, 1.20.0, 1.20.1, 1.21.0, 1.21.1, 1.22.0, 1.22.1, 1.23.0, 1.23.1, 1.24.0, 1.24.1, 1.25.0, 1.25.1, 1.26.0, 1.26.1, 1.27.0, 1.27.1, 1.28.0, 1.28.1, 1.29.0, 1.29.1, 1.30.0, 1.30.1, 1.31.0, 1.31.1, 1.32.0, 1.32.1, 1.33.0, 1.33.1, 1.34.0, 1.34.1, 1.34.2, 1.35.0
All unaffected versions: 1.33.2, 1.34.3, 1.35.1