CVE-2020-35659

The DNS query log in Pi-hole before 5.2.2 is vulnerable to stored XSS. An attacker with the ability to directly or indirectly query DNS with a malicious hostname can cause arbitrary JavaScript to execute when the Pi-hole administrator visits the Query Log or Long-term data Query Log page.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pi-hole:pi-hole:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:27

Type Values Removed Values Added
References () https://blog.mirch.io/2020/12/24/pihole-xss/ - Third Party Advisory () https://blog.mirch.io/2020/12/24/pihole-xss/ - Third Party Advisory
References () https://discourse.pi-hole.net/t/pi-hole-core-web-v5-2-2-and-ftl-v5-3-3-released/41998 - Release Notes, Vendor Advisory () https://discourse.pi-hole.net/t/pi-hole-core-web-v5-2-2-and-ftl-v5-3-3-released/41998 - Release Notes, Vendor Advisory
References () https://github.com/pi-hole/AdminLTE/pull/1665 - Patch, Third Party Advisory () https://github.com/pi-hole/AdminLTE/pull/1665 - Patch, Third Party Advisory

Information

Published : 2020-12-24 16:15

Updated : 2024-11-21 05:27


NVD link : CVE-2020-35659

Mitre link : CVE-2020-35659

CVE.ORG link : CVE-2020-35659


JSON object : View

Products Affected

pi-hole

  • pi-hole
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')