AList is a file list program that supports multiple storages. AList contains a reflected cross-site scripting vulnerability in helper.go. The endpoint /i/:link_name takes in a user-provided value and reflects it back in the response. The endpoint returns an application/xml response, opening it up to HTML tags via XHTML and thus leading to a XSS vulnerability. This vulnerability is fixed in 3.29.0.
References
Link | Resource |
---|---|
https://github.com/alist-org/alist/commit/6100647310594868e931f3de1188ddd8bde93b78 | Patch |
https://securitylab.github.com/advisories/GHSL-2023-220_Alist/ | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-09-30 16:15
Updated : 2024-11-15 16:28
NVD link : CVE-2024-47067
Mitre link : CVE-2024-47067
CVE.ORG link : CVE-2024-47067
JSON object : View
Products Affected
alist_project
- alist
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')