In PrivateBin versions 1.2.0 before 1.2.2, and 1.3.0 before 1.3.2, a persistent XSS attack is possible. Under certain conditions, a user provided attachment file name can inject HTML leading to a persistent Cross-site scripting (XSS) vulnerability. The vulnerability has been fixed in PrivateBin v1.3.2 & v1.2.2. Admins are urged to upgrade to these versions to protect the affected users.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/PrivateBin/PrivateBin/security/advisories/GHSA-8j72-p2wm-6738 | third party advisory exploit |
https://privatebin.info/news/v1.3.2-v1.2.2-release.html | release notes vendor advisory |
https://github.com/PrivateBin/PrivateBin/commit/8d0ac336d23cd8c98e71d5f21cdadcae9c8a26e6 | patch |
https://github.com/PrivateBin/PrivateBin/issues/554 | third party advisory |