Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-xgfm-fjx6-62mj: readthedocs-sphinx-search vulnerable to cross-site scripting when including search results from malicious projects

Impact

This vulnerability could have allowed an attacker to include arbitrary HTML content in search results by having a user search a malicious project. This was due to our search client not correctly escaping all user content from search results. You can find more information in the advisory published in our readthedocs.org repo.

Users of this extension should update to the 0.3.2 version, and trigger a new build.

This issue was discovered by a member of our team, and we have seen no signs that this vulnerability was exploited in the wild.

Patches

This issue has been patched in our 0.3.2 version.

References

  • https://github.com/readthedocs/readthedocs-sphinx-search/commit/8c6f6d01e88e72ef32ed0c220b6c19d1e1121c73

For more information

If you have any questions or comments about this advisory, email us at [email protected] (PGP)

ghsa
#xss#vulnerability#git
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. GHSA-xgfm-fjx6-62mj

readthedocs-sphinx-search vulnerable to cross-site scripting when including search results from malicious projects

Moderate severity GitHub Reviewed Published Jan 15, 2024 in readthedocs/readthedocs-sphinx-search

Vulnerability details Dependabot alerts 0

Package

pip readthedocs-sphinx-search (pip)

Affected versions

<= 0.3.1

Patched versions

0.3.2

Description

Impact

This vulnerability could have allowed an attacker to include arbitrary HTML content in search results by having a user search a malicious project. This was due to our search client not correctly escaping all user content from search results. You can find more information in the advisory published in our readthedocs.org repo.

Users of this extension should update to the 0.3.2 version, and trigger a new build.

This issue was discovered by a member of our team, and we have seen no signs that this vulnerability was exploited in the wild.

Patches

This issue has been patched in our 0.3.2 version.

References

  • readthedocs/readthedocs-sphinx-search@8c6f6d0

For more information

If you have any questions or comments about this advisory, email us at [email protected] (PGP)

References

  • GHSA-xgfm-fjx6-62mj
  • readthedocs/readthedocs-sphinx-search@8c6f6d0

stsewd published to readthedocs/readthedocs-sphinx-search

Jan 15, 2024

Published to the GitHub Advisory Database

Jan 16, 2024

Reviewed

Jan 16, 2024

Severity

Moderate

6.3

/ 10

CVSS base metrics

Attack vector

Network

Attack complexity

Low

Privileges required

Low

User interaction

Required

Scope

Unchanged

Confidentiality

High

Integrity

Low

Availability

None

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N

Weaknesses

CWE-79

CVE ID

No known CVE

GHSA ID

GHSA-xgfm-fjx6-62mj

Source code

readthedocs/readthedocs-sphinx-search

Credits

  • stsewd Analyst

Checking history

See something to contribute? Suggest improvements for this vulnerability.

ghsa: Latest News

GHSA-7p9f-6x8j-gxxp: CRI-O: Maliciously structured checkpoint file can gain arbitrary node access