|
Message-ID: <ZKc+3fA5yQVqHVTc@netmeister.org> Date: Thu, 6 Jul 2023 18:23:25 -0400 From: Jan Schaumann <jschauma@...meister.org> To: oss-security@...ts.openwall.com Subject: CVE-2023-36459: mastodon: XSS through oEmbed preview cards (I have no affiliation with the project, but posting this here because it seems to me that increasingly non-packaged / GitHub distributed projects tend not to send out announcements here.) https://github.com/mastodon/mastodon/security/advisories/GHSA-ccm4-vgcc-73hp (This advisory describes an issue found by Cure53 as part of an audit performed at Mozilla's request) Using carefully crafted oEmbed data, an attacker can bypass the HTML sanitization performed by Mastodon and include arbitrary HTML in oEmbed preview cards. Impact This introduces a vector for Cross-site-scripting (XSS) payloads that can be rendered in the user's browser when a preview card for a malicious link is clicked through. CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N Severity: 9.3/10 CVE-2023-36459 Affected versions: >= 1.3 Patched versions: 4.1.3, 4.0.5, 3.5.9
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.