Products
AList
- 3.29.0
Source
security-advisories@github.com
Tags
CVE-2024-47067 details
Published : Sept. 30, 2024, 4:15 p.m.
Last Modified : Sept. 30, 2024, 4:15 p.m.
Last Modified : Sept. 30, 2024, 4:15 p.m.
Description
AList is a file list program that supports multiple storages. AList contains a reflected cross-site scripting vulnerability in helper.go. The endpoint /i/:link_name takes in a user-provided value and reflects it back in the response. The endpoint returns an application/xml response, opening it up to HTML tags via XHTML and thus leading to a XSS vulnerability. This vulnerability is fixed in 3.29.0.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-79 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
References
URL | Source |
---|---|
https://github.com/alist-org/alist/commit/6100647310594868e931f3de1188ddd8bde93b78 | security-advisories@github.com |
https://securitylab.github.com/advisories/GHSL-2023-220_Alist/ | security-advisories@github.com |
This website uses the NVD API, but is not approved or certified by it.