AList is a file list program that supports multiple storages. AList contains a reflected cross-site scripting vulnerability in helper.go. The endpoint /i/:link_name takes in a user-provided value and reflects it back in the response. The endpoint returns an application/xml response, opening it up to HTML tags via XHTML and thus leading to a XSS vulnerability. This vulnerability is fixed in 3.29.0.
References
Link | Resource |
---|---|
https://github.com/alist-org/alist/commit/6100647310594868e931f3de1188ddd8bde93b78 | Patch |
https://securitylab.github.com/advisories/GHSL-2023-220_Alist/ | Exploit Third Party Advisory |
Configurations
History
15 Nov 2024, 16:28
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
First Time |
Alist Project
Alist Project alist |
|
References | () https://github.com/alist-org/alist/commit/6100647310594868e931f3de1188ddd8bde93b78 - Patch | |
References | () https://securitylab.github.com/advisories/GHSL-2023-220_Alist/ - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:alist_project:alist:*:*:*:*:*:*:*:* |
04 Oct 2024, 13:51
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
30 Sep 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-30 16:15
Updated : 2024-11-15 16:28
NVD link : CVE-2024-47067
Mitre link : CVE-2024-47067
CVE.ORG link : CVE-2024-47067
JSON object : View
Products Affected
alist_project
- alist
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')