Skip to content

Commit c9d005e

Browse files
jasnowRubySec CI
authored and
RubySec CI
committed
Updated advisory posts against rubysec/ruby-advisory-db@4d49a95
1 parent 05a1920 commit c9d005e

File tree

1 file changed

+50
-0
lines changed

1 file changed

+50
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,50 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2024-39311 (publify_core): Publify Vulnerable To Cross-Site Scripting
4+
(XSS) Via Redirects Requiring User Interaction'
5+
comments: false
6+
categories:
7+
- publify_core
8+
advisory:
9+
gem: publify_core
10+
cve: 2024-39311
11+
ghsa: 8fm5-gg2f-f66q
12+
url: https://github.com/publify/publify/security/advisories/GHSA-8fm5-gg2f-f66q
13+
title: Publify Vulnerable To Cross-Site Scripting (XSS) Via Redirects Requiring
14+
User Interaction
15+
date: 2025-03-28
16+
description: |
17+
### Summary
18+
19+
A publisher on a `publify` application is able to perform a cross-site
20+
scripting attack on an administrator using the redirect functionality.
21+
22+
### Details
23+
24+
A publisher on a `publify` application is able to perform a cross-site
25+
scripting attack on an administrator using the redirect functionality.
26+
The exploitation of this XSS vulnerability requires the administrator
27+
to click a malicious link.
28+
29+
We can create a redirect to a `javascript:alert()` URL. Whilst the
30+
redirect itself doesn't work, on the administrative panel, an a tag
31+
is created with the payload as the URI. Upon clicking this link,
32+
the XSS is triggered.
33+
34+
An attack could attempt to hide their payload by using HTML, or
35+
other encodings, as to not make it obvious to an administrator
36+
that this is a malicious link.
37+
38+
### Impact
39+
40+
A publisher may attempt to use this vulnerability to escalate their
41+
privileges and become an administrator."
42+
cvss_v4: 1.8
43+
patched_versions:
44+
- ">= 10.0.2"
45+
related:
46+
url:
47+
- https://nvd.nist.gov/vuln/detail/CVE-2024-39311
48+
- https://github.com/publify/publify/security/advisories/GHSA-8fm5-gg2f-f66q
49+
- https://github.com/advisories/GHSA-8fm5-gg2f-f66q
50+
---

0 commit comments

Comments
 (0)