Skip to content

Commit 4d49a95

Browse files
jasnowpostmodern
authored andcommitted
GHSA SYNC: 1 brand new advisory
1 parent 62b6ac2 commit 4d49a95

File tree

1 file changed

+42
-0
lines changed

1 file changed

+42
-0
lines changed

Diff for: gems/publify_core/CVE-2024-39311.yml

+42
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,42 @@
1+
---
2+
gem: publify_core
3+
cve: 2024-39311
4+
ghsa: 8fm5-gg2f-f66q
5+
url: https://github.com/publify/publify/security/advisories/GHSA-8fm5-gg2f-f66q
6+
title: Publify Vulnerable To Cross-Site Scripting (XSS) Via
7+
Redirects Requiring User Interaction
8+
date: 2025-03-28
9+
description: |
10+
### Summary
11+
12+
A publisher on a `publify` application is able to perform a cross-site
13+
scripting attack on an administrator using the redirect functionality.
14+
15+
### Details
16+
17+
A publisher on a `publify` application is able to perform a cross-site
18+
scripting attack on an administrator using the redirect functionality.
19+
The exploitation of this XSS vulnerability requires the administrator
20+
to click a malicious link.
21+
22+
We can create a redirect to a `javascript:alert()` URL. Whilst the
23+
redirect itself doesn't work, on the administrative panel, an a tag
24+
is created with the payload as the URI. Upon clicking this link,
25+
the XSS is triggered.
26+
27+
An attack could attempt to hide their payload by using HTML, or
28+
other encodings, as to not make it obvious to an administrator
29+
that this is a malicious link.
30+
31+
### Impact
32+
33+
A publisher may attempt to use this vulnerability to escalate their
34+
privileges and become an administrator."
35+
cvss_v4: 1.8
36+
patched_versions:
37+
- ">= 10.0.2"
38+
related:
39+
url:
40+
- https://nvd.nist.gov/vuln/detail/CVE-2024-39311
41+
- https://github.com/publify/publify/security/advisories/GHSA-8fm5-gg2f-f66q
42+
- https://github.com/advisories/GHSA-8fm5-gg2f-f66q

0 commit comments

Comments
 (0)