Vulnerability Details : CVE-2020-5223
In PrivateBin versions 1.2.0 before 1.2.2, and 1.3.0 before 1.3.2, a persistent XSS attack is possible. Under certain conditions, a user provided attachment file name can inject HTML leading to a persistent Cross-site scripting (XSS) vulnerability. The vulnerability has been fixed in PrivateBin v1.3.2 & v1.2.2. Admins are urged to upgrade to these versions to protect the affected users.
Vulnerability category: Cross site scripting (XSS)
Products affected by CVE-2020-5223
- cpe:2.3:a:privatebin:privatebin:*:*:*:*:*:*:*:*
- cpe:2.3:a:privatebin:privatebin:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-5223
0.08%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 33 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-5223
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.1
|
LOW | AV:N/AC:H/Au:S/C:N/I:P/A:N |
3.9
|
2.9
|
NIST | |
4.4
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N |
1.3
|
2.7
|
NIST | |
6.1
|
MEDIUM | CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N |
0.8
|
4.7
|
GitHub, Inc. |
CWE ids for CVE-2020-5223
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by:
- nvd@nist.gov (Primary)
- security-advisories@github.com (Secondary)
References for CVE-2020-5223
-
https://github.com/PrivateBin/PrivateBin/security/advisories/GHSA-8j72-p2wm-6738
Persistent XSS vulnerability in filename of attached file in PrivateBin < 1.3.2/1.2.2 (2020-01-11) · Advisory · PrivateBin/PrivateBin · GitHubExploit;Third Party Advisory
-
https://github.com/PrivateBin/PrivateBin/issues/554
HTML injection via unescaped attachment filename · Issue #554 · PrivateBin/PrivateBin · GitHubThird Party Advisory
-
https://privatebin.info/news/v1.3.2-v1.2.2-release.html
Release v1.3.2 & v1.2.2 - Fix for persistent XSS vulnerability in filenames of attached files - PrivateBinRelease Notes;Vendor Advisory
-
https://github.com/PrivateBin/PrivateBin/commit/8d0ac336d23cd8c98e71d5f21cdadcae9c8a26e6
addressing jsverifyRngState 8b8f0d4ec2a67139b5, fixes HTML injection … · PrivateBin/PrivateBin@8d0ac33 · GitHubPatch
Jump to