OpenZiti is a free and open source project focused on bringing zero trust to any application. An endpoint(/api/upload) on the admin panel can be accessed without any form of authentication. This endpoint accepts an HTTP POST to upload a file which is then stored on the node and is available via URL. This can lead to a stored cross site scripting attack if the file uploaded contains malicious code and is then accessed and executed within the context of the user's browser. This function is no longer necessary as the ziti-console moves from a node server application to a single page application, and has been disabled. The vulnerability is fixed in 3.7.1.
References
Link | Resource |
---|---|
https://github.com/openziti/ziti-console/security/advisories/GHSA-frxm-vm48-5qf2 | Third Party Advisory |
Configurations
History
05 Mar 2025, 20:16
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:openziti:openziti:*:*:*:*:*:*:*:* | |
Summary |
|
|
References | () https://github.com/openziti/ziti-console/security/advisories/GHSA-frxm-vm48-5qf2 - Third Party Advisory | |
First Time |
Openziti
Openziti openziti |
03 Mar 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-03 19:15
Updated : 2025-03-05 20:16
NVD link : CVE-2025-27500
Mitre link : CVE-2025-27500
CVE.ORG link : CVE-2025-27500
JSON object : View
Products Affected
openziti
- openziti
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')