Gotify server is a simple server for sending and receiving messages in real-time per WebSocket. Versions prior to 2.2.2 contain an XSS vulnerability that allows authenticated users to upload .html files. An attacker could execute client side scripts **if** another user opened a link. The attacker could potentially take over the account of the user that clicked the link. The Gotify UI won't natively expose such a malicious link, so an attacker has to get the user to open the malicious link in a context outside of Gotify. The vulnerability has been fixed in version 2.2.2. As a workaround, you can block access to non image files via a reverse proxy in the `./image` directory.
References
Link | Resource |
---|---|
https://github.com/gotify/server/pull/534 | Patch Third Party Advisory |
https://github.com/gotify/server/pull/535 | Third Party Advisory |
https://github.com/gotify/server/security/advisories/GHSA-xv6x-456v-24xh | Third Party Advisory |
https://github.com/gotify/server/pull/534 | Patch Third Party Advisory |
https://github.com/gotify/server/pull/535 | Third Party Advisory |
https://github.com/gotify/server/security/advisories/GHSA-xv6x-456v-24xh | Third Party Advisory |
Configurations
History
21 Nov 2024, 07:30
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-12-29 19:15
Updated : 2024-11-21 07:30
NVD link : CVE-2022-46181
Mitre link : CVE-2022-46181
CVE.ORG link : CVE-2022-46181
JSON object : View
Products Affected
gotify
- server
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')