File tree 1 file changed +42
-0
lines changed
1 file changed +42
-0
lines changed Original file line number Diff line number Diff line change
1
+ ---
2
+ gem : publify_core
3
+ cve : 2024-39311
4
+ ghsa : 8fm5-gg2f-f66q
5
+ url : https://github.com/publify/publify/security/advisories/GHSA-8fm5-gg2f-f66q
6
+ title : Publify Vulnerable To Cross-Site Scripting (XSS) Via
7
+ Redirects Requiring User Interaction
8
+ date : 2025-03-28
9
+ description : |
10
+ ### Summary
11
+
12
+ A publisher on a `publify` application is able to perform a cross-site
13
+ scripting attack on an administrator using the redirect functionality.
14
+
15
+ ### Details
16
+
17
+ A publisher on a `publify` application is able to perform a cross-site
18
+ scripting attack on an administrator using the redirect functionality.
19
+ The exploitation of this XSS vulnerability requires the administrator
20
+ to click a malicious link.
21
+
22
+ We can create a redirect to a `javascript:alert()` URL. Whilst the
23
+ redirect itself doesn't work, on the administrative panel, an a tag
24
+ is created with the payload as the URI. Upon clicking this link,
25
+ the XSS is triggered.
26
+
27
+ An attack could attempt to hide their payload by using HTML, or
28
+ other encodings, as to not make it obvious to an administrator
29
+ that this is a malicious link.
30
+
31
+ ### Impact
32
+
33
+ A publisher may attempt to use this vulnerability to escalate their
34
+ privileges and become an administrator."
35
+ cvss_v4 : 1.8
36
+ patched_versions :
37
+ - " >= 10.0.2"
38
+ related :
39
+ url :
40
+ - https://nvd.nist.gov/vuln/detail/CVE-2024-39311
41
+ - https://github.com/publify/publify/security/advisories/GHSA-8fm5-gg2f-f66q
42
+ - https://github.com/advisories/GHSA-8fm5-gg2f-f66q
You can’t perform that action at this time.
0 commit comments