AList is a file list program that supports multiple storages. AList contains a reflected cross-site scripting vulnerability in helper.go. The endpoint /i/:link_name takes in a user-provided value and reflects it back in the response. The endpoint returns an application/xml response, opening it up to HTML tags via XHTML and thus leading to a XSS vulnerability. This vulnerability is fixed in 3.29.0.
Metrics
Affected Vendors & Products
References
History
Fri, 15 Nov 2024 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Mon, 30 Sep 2024 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Alist Project
Alist Project alist |
|
| CPEs | cpe:2.3:a:alist_project:alist:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Alist Project
Alist Project alist |
|
| Metrics |
ssvc
|
Mon, 30 Sep 2024 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | AList is a file list program that supports multiple storages. AList contains a reflected cross-site scripting vulnerability in helper.go. The endpoint /i/:link_name takes in a user-provided value and reflects it back in the response. The endpoint returns an application/xml response, opening it up to HTML tags via XHTML and thus leading to a XSS vulnerability. This vulnerability is fixed in 3.29.0. | |
| Title | Alist Contains a Reflected Cross-Site Scripting Vulnerability | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-09-30T17:24:16.581Z
Reserved: 2024-09-17T17:42:37.029Z
Link: CVE-2024-47067
Updated: 2024-09-30T17:24:04.879Z
Status : Analyzed
Published: 2024-09-30T16:15:09.267
Modified: 2024-11-15T16:28:48.533
Link: CVE-2024-47067
No data.