Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1xOGhnLTN2cXYtZjh2M84AAtoz
Fava vulnerable to Reflected Cross-site Scripting
Cross-site Scripting (XSS) - Reflected in GitHub repository beancount/fava prior to 1.22.2.
The query_string
parameter of Fava is vulnerable to reflected cross-site scripting, for which a attacker can modify any information that the user is able to modify. This issue is fixed in version 1.22.2.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1xOGhnLTN2cXYtZjh2M84AAtoz
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 2 years ago
Updated: 23 days ago
CVSS Score: 6.1
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Identifiers: GHSA-q8hg-3vqv-f8v3, CVE-2022-2523
References:
- https://nvd.nist.gov/vuln/detail/CVE-2022-2523
- https://github.com/beancount/fava/commit/dccfb6a2f4567f35ce2e9a78e24f92ebf946bc9b
- https://huntr.dev/bounties/2a1802d8-1c2e-4919-96a7-d4dcf7ffcf8f
- https://github.com/pypa/advisory-database/tree/main/vulns/fava/PYSEC-2022-240.yaml
- https://github.com/advisories/GHSA-q8hg-3vqv-f8v3
Blast Radius: 8.7
Affected Packages
pypi:fava
Dependent packages: 4Dependent repositories: 27
Downloads: 137,628 last month
Affected Version Ranges: >= 0, < 1.22.2
Fixed in: 1.22.2
All affected versions: 0.0.0, 1.20.1, 1.22.1
All unaffected versions: 1.22.2, 1.22.3, 1.23.1, 1.24.1, 1.24.2, 1.24.3, 1.24.4, 1.25.1, 1.26.1, 1.26.2, 1.26.3, 1.26.4, 1.27.1, 1.27.2, 1.27.3