In PrivateBin versions 1.2.0 before 1.2.2, and 1.3.0 before 1.3.2, a persistent XSS attack is possible. Under certain conditions, a user provided attachment file name can inject HTML leading to a persistent Cross-site scripting (XSS) vulnerability. The vulnerability has been fixed in PrivateBin v1.3.2 & v1.2.2. Admins are urged to upgrade to these versions to protect the affected users.
References
Link | Resource |
---|---|
https://github.com/PrivateBin/PrivateBin/commit/8d0ac336d23cd8c98e71d5f21cdadcae9c8a26e6 | Patch |
https://github.com/PrivateBin/PrivateBin/issues/554 | Third Party Advisory |
https://github.com/PrivateBin/PrivateBin/security/advisories/GHSA-8j72-p2wm-6738 | Exploit Third Party Advisory |
https://privatebin.info/news/v1.3.2-v1.2.2-release.html | Release Notes Vendor Advisory |
https://github.com/PrivateBin/PrivateBin/commit/8d0ac336d23cd8c98e71d5f21cdadcae9c8a26e6 | Patch |
https://github.com/PrivateBin/PrivateBin/issues/554 | Third Party Advisory |
https://github.com/PrivateBin/PrivateBin/security/advisories/GHSA-8j72-p2wm-6738 | Exploit Third Party Advisory |
https://privatebin.info/news/v1.3.2-v1.2.2-release.html | Release Notes Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:33
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 2.1
v3 : 6.1 |
References | () https://github.com/PrivateBin/PrivateBin/commit/8d0ac336d23cd8c98e71d5f21cdadcae9c8a26e6 - Patch | |
References | () https://github.com/PrivateBin/PrivateBin/issues/554 - Third Party Advisory | |
References | () https://github.com/PrivateBin/PrivateBin/security/advisories/GHSA-8j72-p2wm-6738 - Exploit, Third Party Advisory | |
References | () https://privatebin.info/news/v1.3.2-v1.2.2-release.html - Release Notes, Vendor Advisory |
Information
Published : 2020-01-23 02:15
Updated : 2024-11-21 05:33
NVD link : CVE-2020-5223
Mitre link : CVE-2020-5223
CVE.ORG link : CVE-2020-5223
JSON object : View
Products Affected
privatebin
- privatebin
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')