mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-12 02:04:49 +00:00
104 lines
4.6 KiB
JSON
104 lines
4.6 KiB
JSON
{
|
|
"id": "CVE-2022-39239",
|
|
"sourceIdentifier": "security-advisories@github.com",
|
|
"published": "2022-09-23T08:15:09.087",
|
|
"lastModified": "2022-09-27T14:08:14.573",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "netlify-ipx is an on-Demand image optimization for Netlify using ipx. In versions prior to 1.2.3, an attacker can bypass the source image domain allowlist by sending specially crafted headers, causing the handler to load and return arbitrary images. Because the response is cached globally, this image will then be served to visitors without requiring those headers to be set. XSS can be achieved by requesting a malicious SVG with embedded scripts, which would then be served from the site domain. Note that this does not apply to images loaded in `<img>` tags, as scripts do not execute in this context. The image URL can be set in the header independently of the request URL, meaning any site images that have not previously been cached can have their cache poisoned. This problem has been fixed in version 1.2.3. As a workaround, cached content can be cleared by re-deploying the site."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "netlify-ipx es una optimizaci\u00f3n de im\u00e1genes bajo demanda para Netlify usando ipx. En las versiones anteriores a la 1.2.3, un atacante puede saltarse la lista de permisos del dominio de la imagen de origen mediante el env\u00edo de encabezados especialmente dise\u00f1adas, causando que el administrador cargue y devuelva im\u00e1genes arbitrarias. Dado que la respuesta es almacenada en cach\u00e9 de forma global, esta imagen ser\u00e1 servida a visitantes sin necesidad de establecer esos encabezados. El ataque de tipo XSS puede lograrse al solicitar un SVG malicioso con scripts insertados, que luego ser\u00e1 servido desde el dominio del sitio. Tenga en cuenta que esto no es aplicado a im\u00e1genes cargadas en \"(img)\" ya que los scripts no son ejecutados en este contexto. La URL de la imagen puede establecerse en el encabezado independientemente de la URL de la petici\u00f3n, lo que significa que cualquier imagen del sitio que no haya sido previamente almacenada en la cach\u00e9 puede ser envenenada. Este problema ha sido corregido en la versi\u00f3n 1.2.3. Como mitigaci\u00f3n, el contenido almacenado en la cach\u00e9 puede borrarse al volver a desplegar el sitio."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.4,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 2.3,
|
|
"impactScore": 2.7
|
|
},
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 6.1,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 2.7
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
},
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-918"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:nuxtjs:netlify-ipx:*:*:*:*:*:node.js:*:*",
|
|
"versionEndExcluding": "1.2.3",
|
|
"matchCriteriaId": "2C761B6E-F610-420A-986C-CCFB93D9B325"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/netlify/netlify-ipx/security/advisories/GHSA-9jjv-524m-jm98",
|
|
"source": "security-advisories@github.com",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |