logo

CVE-2022-46181 github.com/gotify/server

Package

Manager: go
Name: github.com/gotify/server
Vulnerable Version: >=0 <2.2.2

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N

EPSS: 0.00127 pctl0.32793

Details

gotify/server vulnerable to Cross-site Scripting in the application image file upload ### Impact The XSS vulnerability allows authenticated users to upload .html files. With that, an attacker could execute client side scripts **if** another user opened a link, such as: ``` https://push.example.org/image/[alphanumeric string].html ``` An attacker could potentially take over the account of the user that clicked the link. Keep in mind, the Gotify UI won't natively expose such a malicious link, so an attacker has to get the user to open the malicious link in a context outside of Gotify. ### Patches The vulnerability has been fixed in version 2.2.2. ### Workarounds You can block access to non image files via a reverse proxy in the `./image` directory. ### References https://github.com/gotify/server/pull/534 https://github.com/gotify/server/pull/535 --- Thanks to rickshang (aka 无在无不在) for discovering and reporting this bug.

Metadata

Created: 2022-12-30T00:58:09Z
Modified: 2022-12-30T00:58:09Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/12/GHSA-xv6x-456v-24xh/GHSA-xv6x-456v-24xh.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-xv6x-456v-24xh
Finding: F425
Auto approve: 1