CVE-2022-43996 – github.com/csaf-poc/csaf_distribution
Package
Manager: go
Name: github.com/csaf-poc/csaf_distribution
Vulnerable Version: >=0 <0.8.2
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00412 pctl0.60683
Details
csaf-poc/csaf_distribution Cross-site Scripting vulnerability The csaf_provider package before 0.8.2 allows XSS via a crafted CSAF document uploaded as text/html. The endpoint upload allows valid CSAF advisories (JSON format) to be uploaded with Content-Type text/html and filenames ending in .html. When subsequently accessed via web browser, these advisories are served and interpreted as HTML pages. Such uploaded advisories can contain JavaScript code that will execute within the browser context of users inspecting the advisory.
Metadata
Created: 2022-12-14T00:30:23Z
Modified: 2025-04-23T14:55:10Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/12/GHSA-xxfx-w2rw-gh63/GHSA-xxfx-w2rw-gh63.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-xxfx-w2rw-gh63
Finding: F425
Auto approve: 1