Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1nMnZnLThoZmctNzl2as4ABCrg
Koji Cross-site Scripting
A vulnerability in Koji was found. An unsanitized input allows for an XSS attack. Javascript code from a malicious link could be reflected in the resulting web page. It is not expected to be able to submit an action or make a change in Koji due to existing XSS protections in the code.
Permalink: https://github.com/advisories/GHSA-g2vg-8hfg-79vjJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1nMnZnLThoZmctNzl2as4ABCrg
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 16 days ago
Updated: 13 days ago
CVSS Score: 5.4
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
EPSS Percentage: 0.00045
EPSS Percentile: 0.15621
Identifiers: GHSA-g2vg-8hfg-79vj, CVE-2024-9427
References:
- https://nvd.nist.gov/vuln/detail/CVE-2024-9427
- https://bugzilla.redhat.com/show_bug.cgi?id=2316047
- https://docs.pagure.org/koji/CVEs/CVE-2024-9427
- https://pagure.io/koji/c/8c72d90d7bb991f8fb193851b80847ac9e9474a4?branch=master
- https://github.com/advisories/GHSA-g2vg-8hfg-79vj
Affected Packages
pypi:koji
Dependent packages: 12Dependent repositories: 95
Downloads: 18,614 last month
Affected Version Ranges: < 1.33.2, >= 1.34.0, < 1.34.3, = 1.35.0
Fixed in: 1.33.2, 1.34.3, 1.35.1
All affected versions: 1.15.0, 1.16.0, 1.16.1, 1.17.0, 1.18.0, 1.19.0, 1.19.1, 1.20.0, 1.20.1, 1.21.0, 1.21.1, 1.22.0, 1.22.1, 1.23.0, 1.23.1, 1.24.0, 1.24.1, 1.25.0, 1.25.1, 1.26.0, 1.26.1, 1.27.0, 1.27.1, 1.28.0, 1.28.1, 1.29.0, 1.29.1, 1.30.0, 1.30.1, 1.31.0, 1.31.1, 1.32.0, 1.32.1, 1.33.0, 1.33.1, 1.34.0, 1.34.1, 1.34.2, 1.35.0
All unaffected versions: 1.33.2, 1.34.3, 1.35.1