Skip to content

Commit 58766d8

Browse files
authored
GHSA SYNC: 3 brand new advisories (#794)
1 parent 577457f commit 58766d8

File tree

3 files changed

+116
-0
lines changed

3 files changed

+116
-0
lines changed

gems/decidim-admin/CVE-2024-27095.yml

+42
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,42 @@
1+
---
2+
gem: decidim-admin
3+
cve: 2024-27095
4+
ghsa: 529p-jj47-w3m3
5+
url: https://github.com/decidim/decidim/security/advisories/GHSA-529p-jj47-w3m3
6+
title: Decidim cross-site scripting (XSS) in the admin panel
7+
date: 2024-07-10
8+
description: |
9+
### Impact
10+
11+
The admin panel is subject to potential XSS attach in case the attacker
12+
manages to modify some records being uploaded to the server.
13+
14+
The attacker is able to change e.g. to `<svg onload=alert('XSS')>`
15+
if they know how to craft these requests themselves. And then enter
16+
the returned blob ID to the form inputs manually by modifying the
17+
edit page source.
18+
19+
### Patches
20+
21+
Available in versions 0.27.6 and 0.28.1.
22+
23+
### Workarounds
24+
25+
Review the user accounts that have access to the admin panel (i.e.
26+
general Administrators, and participatory space's Administrators)
27+
and remove access to them if they don't need it.
28+
29+
### References
30+
31+
OWASP ASVS v4.0.3-5.1.3
32+
cvss_v3: 5.4
33+
patched_versions:
34+
- "~> 0.27.6"
35+
- ">= 0.28.1"
36+
related:
37+
url:
38+
- https://nvd.nist.gov/vuln/detail/CVE-2024-27095
39+
- https://github.com/decidim/decidim/security/advisories/GHSA-529p-jj47-w3m3
40+
- https://github.com/decidim/decidim/releases/tag/v0.27.6
41+
- https://github.com/decidim/decidim/releases/tag/v0.28.1
42+
- https://github.com/advisories/GHSA-529p-jj47-w3m3

gems/decidim/CVE-2024-27090.yml

+34
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
---
2+
gem: decidim
3+
cve: 2024-27090
4+
ghsa: qcj6-vxwx-4rqv
5+
url: https://github.com/decidim/decidim/security/advisories/GHSA-qcj6-vxwx-4rqv
6+
title: Decidim vulnerable to data disclosure through the embed feature
7+
date: 2024-07-10
8+
description: |
9+
### Impact
10+
If an attacker can infer the slug or URL of an unpublished or private
11+
resource, and this resource can be embedded (such as a Participatory
12+
Process, an Assembly, a Proposal, a Result, etc), then some data of
13+
this resource could be accessed.
14+
15+
### Patches
16+
17+
Version 0.27.6
18+
19+
https://github.com/decidim/decidim/commit/1756fa639ef393ca8e8bb16221cab2e2e7875705
20+
21+
### Workarounds
22+
23+
Disallow access through your web server to the URLs finished with `/embed.html`
24+
cvss_v3: 5.3
25+
patched_versions:
26+
- ">= 0.27.6"
27+
related:
28+
url:
29+
- https://nvd.nist.gov/vuln/detail/CVE-2024-27090
30+
- https://github.com/decidim/decidim/security/advisories/GHSA-qcj6-vxwx-4rqv
31+
- https://github.com/decidim/decidim/pull/12528
32+
- https://github.com/decidim/decidim/commit/1756fa639ef393ca8e8bb16221cab2e2e7875705
33+
- https://github.com/decidim/decidim/releases/tag/v0.27.6
34+
- https://github.com/advisories/GHSA-qcj6-vxwx-4rqv

gems/decidim/CVE-2024-32469.yml

+40
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
---
2+
gem: decidim
3+
cve: 2024-32469
4+
ghsa: 7cx8-44pc-xv3q
5+
url: https://github.com/decidim/decidim/security/advisories/GHSA-7cx8-44pc-xv3q
6+
title: Decidim cross-site scripting (XSS) in the pagination
7+
date: 2024-07-10
8+
description: |
9+
### Impact
10+
11+
The pagination feature used in searches and filters is subject to
12+
potential XSS attack through a malformed URL using the GET parameter
13+
`per_page`.
14+
15+
### Patches
16+
17+
Patched in version 0.27.6 and 0.28.1
18+
19+
### References
20+
21+
OWASP ASVS v4.0.3-5.1.3
22+
23+
### Credits
24+
25+
This issue was discovered in a security audit organized by the
26+
[mitgestalten Partizipationsbüro](https://partizipationsbuero.at/)
27+
and funded by [netidee](https://www.netidee.at/) against Decidim
28+
done during April 2024. The security audit was implemented by
29+
[AIT Austrian Institute of Technology GmbH](https://www.ait.ac.at/),
30+
cvss_v3: 7.1
31+
patched_versions:
32+
- "~> 0.27.6"
33+
- ">= 0.28.1"
34+
related:
35+
url:
36+
- https://nvd.nist.gov/vuln/detail/CVE-2024-32469
37+
- https://github.com/decidim/decidim/security/advisories/GHSA-7cx8-44pc-xv3q
38+
- https://github.com/decidim/decidim/releases/tag/v0.27.6
39+
- https://github.com/decidim/decidim/releases/tag/v0.28.1
40+
- https://github.com/advisories/GHSA-7cx8-44pc-xv3q

0 commit comments

Comments
 (0)