Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. archivebox
  4. ›
  5. CVE-2023-45815

CVE-2023-45815: Viewing wget extractor output while logged in as an admin allows archived JS to execute in the admins context

October 19, 2023 (updated November 18, 2024)

Any users who are using the wget or dom extractors and view the content they output.

The impact is potentially severe if you are logged in to the ArchiveBox admin site in the same browser session and view an archived malicious page designed to target your ArchiveBox instance. Malicious JS could potentially act using your logged-in admin credentials and add/remove/modify snapshots, add/remove/modify ArchiveBox users, and generally do anything an admin user could do.

The impact is less severe for non-logged-in users, as malicious JS cannot modify any archives, but it can still read all the other archived content by fetching the snapshot index and iterating through it.

Because all of ArchiveBox’s archived content is served from the same host and port as the admin panel, when archived pages are viewed the JS executes in the same context as all the other archived pages (and the admin panel), defeating most of the browser’s usual CORS/CSRF security protections and leading to this issue.

References

  • en.wikipedia.org/wiki/Cross-site_request_forgery
  • github.com/ArchiveBox/ArchiveBox
  • github.com/ArchiveBox/ArchiveBox
  • github.com/ArchiveBox/ArchiveBox/issues/239
  • github.com/ArchiveBox/ArchiveBox/security/advisories/GHSA-cr45-98w9-gwqx
  • github.com/ArchiveBox/ArchiveBox/wiki/Configuration
  • github.com/ArchiveBox/ArchiveBox/wiki/Publishing-Your-Archive
  • github.com/ArchiveBox/ArchiveBox/wiki/Publishing-Your-Archive
  • github.com/ArchiveBox/ArchiveBox/wiki/Security-Overview
  • github.com/advisories/GHSA-cr45-98w9-gwqx
  • github.com/pypa/advisory-database/tree/main/vulns/archivebox/PYSEC-2023-229.yaml
  • nvd.nist.gov/vuln/detail/CVE-2023-45815

Code Behaviors & Features

Detect and mitigate CVE-2023-45815 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 0.6.2

Solution

Unfortunately, there is no solution available yet.

Impact 5.4 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Source file

pypi/archivebox/CVE-2023-45815.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:37 +0000.