Skip to content

XSS Availability in Post Creation and Viewing.

Moderate
benjjvi published GHSA-mv96-w49p-438p Jun 19, 2023

Package

* (PyBB)

Affected versions

<0.1.0

Patched versions

0.1.1

Description

Impact

Manual code review of the PyBB bulletin board server has revealed that a vulnerability could have been exploited in which users could submit any type of HTML tag, and have said tag run. For example, a malicious <a> that looks like <a href=javascript:alert (1)>xss</a> could have been used to run code through JavaScript on the client side.

Patches

The problem has now been patched as of commit 5defd92, and users are advised to upgrade to said version. This vulnerability IS found within the 0.1.0 release, and users are advised to update to 0.1.1.

Workarounds

Users are able to work around the attack by either;

  1. Removing the ability to create posts.
  2. Removing the |safe tag from the Jinja2 template titled "post.html" in templates.
  3. Adding manual validation of links in the post creation section.

References

OWASP XSS Article https://owasp.org/
Wikipedia XSS https://en.wikipedia.org/

Severity

Moderate
5.7
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
Low
User interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N

CVE ID

CVE-2023-34461

Weaknesses

Credits