fix-formatting

patch-1
Dhiyaneshwaran 2024-01-30 13:25:56 +05:30 committed by GitHub
parent fa5123e17d
commit 8e2cd75674
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 14 additions and 4 deletions

View File

@ -1,10 +1,11 @@
id: CVE-2023-47115 id: CVE-2023-47115
info: info:
name: Stored Cross-Site Scripting Vulnerability in Label Studio name: Label Studio - Stored Cross-Site Scripting
author: isacaya author: isacaya
severity: high severity: high
description: Versions prior to 1.9.2 have a cross-site scripting (XSS) vulnerability that could be exploited when an authenticated user uploads a crafted image file for their avatar that gets rendered as a HTML file on the website. description: |
Versions prior to 1.9.2 have a cross-site scripting (XSS) vulnerability that could be exploited when an authenticated user uploads a crafted image file for their avatar that gets rendered as a HTML file on the website.
impact: | impact: |
Executing arbitrary JavaScript could result in an attacker performing malicious actions on Label Studio users if they visit the crafted avatar image. Executing arbitrary JavaScript could result in an attacker performing malicious actions on Label Studio users if they visit the crafted avatar image.
remediation: | remediation: |
@ -12,12 +13,19 @@ info:
reference: reference:
- https://nvd.nist.gov/vuln/detail/CVE-2023-47115 - https://nvd.nist.gov/vuln/detail/CVE-2023-47115
- https://github.com/advisories/GHSA-q68h-xwq5-mm7x - https://github.com/advisories/GHSA-q68h-xwq5-mm7x
- https://docs.djangoproject.com/en/4.2/ref/views/#serving-files-in-development
- https://github.com/HumanSignal/label-studio/blob/1.8.2/label_studio/users/functions.py#L18-L49
- https://github.com/HumanSignal/label-studio/blob/1.8.2/label_studio/users/urls.py#L25-L26
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
cvss-score: 7.1 cvss-score: 7.1
cve-id: CVE-2023-47115 cve-id: CVE-2023-47115
cwe-id: CWE-79 cwe-id: CWE-79
tags: cve,cve2023,xss,authenticated metadata:
verified: true
max-request: 1
shodan-query: http.favicon.hash:-1649949475
tags: cve,cve2023,xss,authenticated,intrusive,label-studio
http: http:
- raw: - raw:
@ -58,12 +66,14 @@ http:
attribute: value attribute: value
xpath: xpath:
- '/html/body/div/form/input' - '/html/body/div/form/input'
- type: json - type: json
part: body part: body
name: id name: id
internal: true internal: true
json: json:
- '.id' - '.id'
- type: json - type: json
part: body part: body
name: filename name: filename