Skip to content

Reflected XSS Vulnerability in dpaste

Moderate severity GitHub Reviewed Published Dec 1, 2023 in DarrenOfficial/dpaste • Updated Dec 7, 2023

Package

pip Dpaste (pip)

Affected versions

< 3.8

Patched versions

3.8

Description

Impact

A security vulnerability has been identified in the expires parameter of the dpaste API, allowing for a POST Reflected XSS attack. This vulnerability can be exploited by an attacker to execute arbitrary JavaScript code in the context of a user's browser, potentially leading to unauthorized access, data theft, or other malicious activities.

Patches

  • A patch has been applied to the dpaste GitHub repository to address the specific content value injection vulnerability.
  • Users are strongly advised to upgrade to dpaste release v3.8 or later versions, as dpaste versions older than v3.8 are susceptible to the identified security vulnerability.
  • The patch can be viewed and applied from the following link: dpaste Commit Patch

Workarounds

At this time, the recommended course of action is to apply the provided patch to the affected systems. No known workarounds have been identified, and applying the patch is the most effective way to remediate the vulnerability.

References

@DarrenOfficial DarrenOfficial published to DarrenOfficial/dpaste Dec 1, 2023
Published to the GitHub Advisory Database Dec 1, 2023
Reviewed Dec 1, 2023
Published by the National Vulnerability Database Dec 1, 2023
Last updated Dec 7, 2023

Severity

Moderate
6.1
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Weaknesses

CVE ID

CVE-2023-49277

GHSA ID

GHSA-r8j9-5cj7-cv39

Source code

Credits

Checking history
See something to contribute? Suggest improvements for this vulnerability.