143 lines
5.7 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2021-43855",
"sourceIdentifier": "security-advisories@github.com",
"published": "2021-12-27T18:15:07.520",
"lastModified": "2022-01-07T14:01:44.003",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Wiki.js is a wiki app built on node.js. Wiki.js 2.5.263 and earlier is vulnerable to stored cross-site scripting through a SVG file upload made via a custom request with a fake MIME type. By creating a crafted SVG file, a malicious Wiki.js user may stage a stored cross-site scripting attack. This allows the attacker to execute malicious JavaScript when the SVG is viewed directly by other users. Scripts do not execute when loaded inside a page via normal `<img>` tags. The malicious SVG can only be uploaded by crafting a custom request to the server with a fake MIME type. A patch in version 2.5.264 fixes this vulnerability by adding an additional file extension verification check to the optional (enabled by default) SVG sanitization step to all file uploads that match the SVG mime type. As a workaround, disable file upload for all non-trusted users."
},
{
"lang": "es",
"value": "Wiki.js es una aplicaci\u00f3n wiki construida sobre node.js. Wiki.js versiones 2.5.263 y anteriores, es vulnerable a un ataque de tipo cross-site scripting almacenado por medio de una carga de archivos SVG realizada por medio de una petici\u00f3n personalizada con un tipo MIME falso. Al crear un archivo SVG dise\u00f1ado, un usuario malicioso de Wiki.js puede llevar a cabo un ataque de tipo Cross-site scripting almacenado. Esto permite al atacante ejecutar JavaScript malicioso cuando el SVG es visto directamente por otros usuarios. Los scripts no se ejecutan cuando se cargan dentro de una p\u00e1gina por medio de etiquetas \"(img)\" normales. El SVG malicioso s\u00f3lo puede subirse al dise\u00f1ar una petici\u00f3n personalizada al servidor con un tipo MIME falso. Un parche en la versi\u00f3n 2.5.264 corrige esta vulnerabilidad al a\u00f1adir una comprobaci\u00f3n adicional de la extensi\u00f3n del archivo al paso opcional (habilitado por defecto) de saneo de SVG a todas las subidas de archivos que coincidan con el tipo mime de SVG. Como soluci\u00f3n, deshabilite la carga de archivos para todos los usuarios que no sean confiables"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.7
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 3.5
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:requarks:wiki.js:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.5.264",
"matchCriteriaId": "1F3F2ADB-A69D-403D-9A61-51A8644F42E0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Requarks/wiki/commit/57b56d3a5b9c00358814e76f3ee5b4bb353ad62f",
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/Requarks/wiki/releases/tag/2.5.264",
"source": "security-advisories@github.com",
"tags": [
"Release Notes",
"Third Party Advisory"
]
},
{
"url": "https://github.com/Requarks/wiki/security/advisories/GHSA-4893-pj5w-3hq9",
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
]
}
]
}