Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1qcGd3LTJyOW0tOHFmd84AA0OU

Kiwi TCMS's misconfigured HTTP headers allow stored XSS execution with Firefox

Impact

Kiwi TCMS allows users to upload attachments to test plans, test cases, etc. Earlier versions of Kiwi TCMS had introduced
changes which were meant to serve all uploaded files as plain text in order to prevent browsers from executing potentially dangerous files when such files are accessed directly!

The previous Nginx configuration was incorrect allowing certain browsers like Firefox to ignore the Content-Type: text/plain header on some occasions thus allowing potentially dangerous scripts to be executed.

Additionally file upload validators and parts of the HTML rendering code have been found to require additional sanitation and improvements.

Patches

References

Disclosed by M Nadeem Qazi and
Mahshooq Zubair.

Permalink: https://github.com/advisories/GHSA-jpgw-2r9m-8qfw
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1qcGd3LTJyOW0tOHFmd84AA0OU
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 10 months ago
Updated: 6 months ago


CVSS Score: 8.1
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

Identifiers: GHSA-jpgw-2r9m-8qfw, CVE-2023-36809
References: Repository: https://github.com/kiwitcms/Kiwi
Blast Radius: 0.0

Affected Packages

pypi:kiwitcms
Dependent packages: 0
Dependent repositories: 1
Downloads: 704 last month
Affected Version Ranges: < 12.5
Fixed in: 12.5
All affected versions: 6.2.1, 6.5.3, 7.2.1, 8.1.99, 8.6.1, 10.3.999
All unaffected versions: