RSSHub is an open source and extensible RSS feed generator. When the URL parameters contain certain special characters, it returns an error page that does not properly handle XSS vulnerabilities, allowing for the execution of arbitrary JavaScript code. Users who access the deliberately constructed URL are affected. This vulnerability was fixed in version c910c4d28717fb860fbe064736641f379fab2c91. Please upgrade to this or a later version, there are no known workarounds.
References
Configurations
History
21 Nov 2024, 07:51
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
References | () https://github.com/DIYgod/RSSHub/commit/c910c4d28717fb860fbe064736641f379fab2c91 - Patch | |
References | () https://github.com/DIYgod/RSSHub/security/advisories/GHSA-32gr-4cq6-5w5q - Patch, Vendor Advisory |
Information
Published : 2023-03-03 23:15
Updated : 2024-11-21 07:51
NVD link : CVE-2023-26491
Mitre link : CVE-2023-26491
CVE.ORG link : CVE-2023-26491
JSON object : View
Products Affected
rsshub
- rsshub
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')