cve/2023/CVE-2023-42808.md

18 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-42808](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42808)
![](https://img.shields.io/static/v1?label=Product&message=common-voice&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%3D%201.88.2%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen)
### Description
Common Voice is the web app for Mozilla Common Voice, a platform for collecting speech donations in order to create public domain datasets for training voice recognition-related tools. Version 1.88.2 is vulnerable to reflected Cross-Site Scripting given that user-controlled data flows to a path expression (path of a network request). This issue may lead to reflected Cross-Site Scripting (XSS) in the context of Common Voices server origin. As of time of publication, it is unknown whether any patches or workarounds exist.
### POC
#### Reference
- https://securitylab.github.com/advisories/GHSL-2023-026_Common_Voice/
#### Github
No PoCs found on GitHub currently.