cve/2023/CVE-2023-40024.md

18 lines
1.4 KiB
Markdown
Raw Permalink Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-40024](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40024)
![](https://img.shields.io/static/v1?label=Product&message=scancode.io&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%2032.5.2%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen)
### Description
ScanCode.io is a server to script and automate software composition analysis pipelines. In the `/license/` endpoint, the detailed view key is not properly validated and sanitized, which can result in a potential cross-site scripting (XSS) vulnerability when attempting to access a detailed license view that does not exist. Attackers can exploit this vulnerability to inject malicious scripts into the response generated by the `license_details_view` function. When unsuspecting users visit the page, their browsers will execute the injected scripts, leading to unauthorized actions, session hijacking, or stealing sensitive information. This issue has been addressed in release `32.5.2`. Users are advised to upgrade. There are no known workarounds for this vulnerability.
### POC
#### Reference
- https://github.com/nexB/scancode.io/security/advisories/GHSA-6xcx-gx7r-rccj
#### Github
No PoCs found on GitHub currently.