CVE-2020-5223

In PrivateBin versions 1.2.0 before 1.2.2, and 1.3.0 before 1.3.2, a persistent XSS attack is possible. Under certain conditions, a user provided attachment file name can inject HTML leading to a persistent Cross-site scripting (XSS) vulnerability. The vulnerability has been fixed in PrivateBin v1.3.2 & v1.2.2. Admins are urged to upgrade to these versions to protect the affected users.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:privatebin:privatebin:*:*:*:*:*:*:*:*
cpe:2.3:a:privatebin:privatebin:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:33

Type Values Removed Values Added
CVSS v2 : 2.1
v3 : 4.4
v2 : 2.1
v3 : 6.1
References () https://github.com/PrivateBin/PrivateBin/commit/8d0ac336d23cd8c98e71d5f21cdadcae9c8a26e6 - Patch () https://github.com/PrivateBin/PrivateBin/commit/8d0ac336d23cd8c98e71d5f21cdadcae9c8a26e6 - Patch
References () https://github.com/PrivateBin/PrivateBin/issues/554 - Third Party Advisory () https://github.com/PrivateBin/PrivateBin/issues/554 - Third Party Advisory
References () https://github.com/PrivateBin/PrivateBin/security/advisories/GHSA-8j72-p2wm-6738 - Exploit, Third Party Advisory () https://github.com/PrivateBin/PrivateBin/security/advisories/GHSA-8j72-p2wm-6738 - Exploit, Third Party Advisory
References () https://privatebin.info/news/v1.3.2-v1.2.2-release.html - Release Notes, Vendor Advisory () https://privatebin.info/news/v1.3.2-v1.2.2-release.html - Release Notes, Vendor Advisory

Information

Published : 2020-01-23 02:15

Updated : 2024-11-21 05:33


NVD link : CVE-2020-5223

Mitre link : CVE-2020-5223

CVE.ORG link : CVE-2020-5223


JSON object : View

Products Affected

privatebin

  • privatebin
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')