Gotify server XSS vulnerability in the application image file upload
Description
Gotify server is a simple server for sending and receiving messages in real-time per WebSocket. Versions prior to 2.2.2 contain an XSS vulnerability that allows authenticated users to upload .html files. An attacker could execute client side scripts if another user opened a link. The attacker could potentially take over the account of the user that clicked the link. The Gotify UI won't natively expose such a malicious link, so an attacker has to get the user to open the malicious link in a context outside of Gotify. The vulnerability has been fixed in version 2.2.2. As a workaround, you can block access to non image files via a reverse proxy in the ./image directory.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/gotify/serverGo | < 2.2.2 | 2.2.2 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-xv6x-456v-24xhghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2022-46181ghsaADVISORY
- github.com/gotify/server/pull/534ghsax_refsource_MISCWEB
- github.com/gotify/server/pull/535ghsax_refsource_MISCWEB
- github.com/gotify/server/security/advisories/GHSA-xv6x-456v-24xhghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.