logo

CVE-2025-24372 ckan

Package

Manager: pip
Name: ckan
Vulnerable Version: >=0 <2.10.7 || >=2.11.0 <2.11.2

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00048 pctl0.14339

Details

CKAN has an XSS vector in user uploaded images in group/org and user profiles ### Impact Using a specially crafted file, a user could potentially upload a file containing code that when executed could send arbitrary requests to the server. If that file was opened by an administrator, it could lead to escalation of privileges of the original submitter or other malicious actions. Users must have been registered to the site to exploit this vulnerability. ### Patches This vulnerability has been fixed in CKAN 2.10.7 and 2.11.2 ### Workarounds On versions prior to CKAN 2.10.7 and 2.11.2, site maintainers can restrict the file types supported for uploading using the [ckan.upload.user.mimetypes](https://docs.ckan.org/en/latest/maintaining/configuration.html#ckan-upload-user-mimetypes) / [ckan.upload.user.types](https://docs.ckan.org/en/latest/maintaining/configuration.html#ckan-upload-user-types) and [ckan.upload.group.mimetypes](https://docs.ckan.org/en/latest/maintaining/configuration.html#ckan-upload-group-mimetypes) / [ckan.upload.group.types](https://docs.ckan.org/en/latest/maintaining/configuration.html#ckan-upload-group-types) config options. To entirely disable file uploads you can use: ```ini ckan.upload.user.types = none ```

Metadata

Created: 2025-02-05T17:41:33Z
Modified: 2025-02-05T21:45:13Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/02/GHSA-7pq5-qcp6-mcww/GHSA-7pq5-qcp6-mcww.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-7pq5-qcp6-mcww
Finding: F425
Auto approve: 1