CVE-2020-15275: malicious SVG attachment causing stored XSS vulnerability
(updated )
An attacker with write
permissions can upload an SVG file that contains malicious javascript. This javascript will be executed in a user’s browser when the user is viewing that SVG file on the wiki.
References
- advisory.checkmarx.net/advisory/CX-2020-4285
- github.com/advisories/GHSA-4q96-6xhq-ff43
- github.com/moinwiki/moin-1.9
- github.com/moinwiki/moin-1.9/commit/31de9139d0aabc171e94032168399b4a0b2a88a2
- github.com/moinwiki/moin-1.9/releases/tag/1.9.11
- github.com/moinwiki/moin-1.9/security/advisories/GHSA-4q96-6xhq-ff43
- github.com/pypa/advisory-database/tree/main/vulns/moin/PYSEC-2020-241.yaml
- nvd.nist.gov/vuln/detail/CVE-2020-15275
- pypi.org/project/moin
Detect and mitigate CVE-2020-15275 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →