ghsa-r3jc-vhf4-6v32
Vulnerability from github
Published
2024-08-21 18:26
Modified
2024-08-21 18:26
Severity ?
6.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
6.1 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N
6.1 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N
VLAI Severity ?
Summary
CKAN has Cross-site Scripting vector in the Datatables view plugin
Details
The Datatables view plugin did not properly escape record data coming from the DataStore, leading to a potential XSS vector.
Impact
Sites running CKAN >= 2.7.0 with the datatables_view
plugin activated. This is a plugin included in CKAN core, that not activated by default but it is widely used to preview tabular data.
Patches
This vulnerability has been fixed in CKAN 2.10.5 and 2.11.0
Workarounds
Prevent importing of tabular files to the DataStore via DataPusher, XLoader,etc, at least those published from untrusted sources.
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "ckan" }, "ranges": [ { "events": [ { "introduced": "2.7.0" }, { "fixed": "2.10.5" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2024-41675" ], "database_specific": { "cwe_ids": [ "CWE-79" ], "github_reviewed": true, "github_reviewed_at": "2024-08-21T18:26:29Z", "nvd_published_at": "2024-08-21T15:15:08Z", "severity": "MODERATE" }, "details": "The [Datatables view plugin](https://docs.ckan.org/en/2.10/maintaining/data-viewer.html#datatables-view) did not properly escape record data coming from the DataStore, leading to a potential XSS vector.\n\n\n### Impact\nSites running CKAN \u003e= 2.7.0 with the `datatables_view` plugin activated. This is a plugin included in CKAN core, that not activated by default but it is widely used to preview tabular data.\n\n### Patches\nThis vulnerability has been fixed in CKAN 2.10.5 and 2.11.0\n\n### Workarounds\nPrevent importing of tabular files to the DataStore via DataPusher, XLoader,etc, at least those published from untrusted sources.\n", "id": "GHSA-r3jc-vhf4-6v32", "modified": "2024-08-21T18:26:29Z", "published": "2024-08-21T18:26:29Z", "references": [ { "type": "WEB", "url": "https://github.com/ckan/ckan/security/advisories/GHSA-r3jc-vhf4-6v32" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41675" }, { "type": "WEB", "url": "https://github.com/ckan/ckan/commit/9e89ce8220ab1445e0bd85a67994a51d9d3d2688" }, { "type": "WEB", "url": "https://github.com/ckan/ckan/commit/d7dfe8c427b1c63c75d788a609f3b7d7620a25a1" }, { "type": "PACKAGE", "url": "https://github.com/ckan/ckan" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N", "type": "CVSS_V3" }, { "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N", "type": "CVSS_V4" } ], "summary": "CKAN has Cross-site Scripting vector in the Datatables view plugin" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…