{"id":22931,"date":"2024-07-22T11:01:01","date_gmt":"2024-07-22T09:01:01","guid":{"rendered":"https:\/\/herolab.usd.de\/?page_id=22931"},"modified":"2024-07-24T11:12:29","modified_gmt":"2024-07-24T09:12:29","slug":"usd-2023-0033","status":"publish","type":"page","link":"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2023-0033\/","title":{"rendered":"usd-2023-0033"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.21.0\" _module_preset=\"default\" background_color=\"#2E353D\" custom_padding=\"||0px|||\" global_colors_info=\"{}\"][et_pb_row _builder_version=\"4.25.2\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.26.1\" _module_preset=\"default\" custom_padding=\"||13px|||\" hover_enabled=\"0\" global_colors_info=\"{}\" sticky_enabled=\"0\"]<\/p>\n<h1>usd-2023-0033 | Cross-Site Scripting in hugocms<\/h1>\n<h1><\/h1>\n<p><strong>Advisory ID<\/strong>: usd-2023-0033<br \/><strong>Product<\/strong>: hugocms<br \/><strong>Affected Version<\/strong>: (latest as of 25.09.2023; commit 77443d6)<br \/><strong>Vulnerability Type<\/strong>: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')<br \/><strong>Security Risk<\/strong>: HIGH<br \/><strong>Vendor URL<\/strong>: <a>https:\/\/hugoeditor.com\/<\/a><br \/><strong>Vendor acknowledged vulnerability<\/strong>: Yes<br \/><strong>Vendor Status<\/strong>: Fixed<br \/><strong>Advisory Status<\/strong>: Published<br \/><strong>CVE Number<\/strong>: CVE-2023-49324<br \/><strong>First Published<\/strong>: 2024-07-18<br \/><strong>Last Update<\/strong>: 2024-07-18<\/p>\n<h3>Desciption<\/h3>\n<p>The application <em>hugocms<\/em>, developed by Inter-Data, provides a frontend for the static site generator <em>hugo<\/em> to manage posts and other aspects of the site. The application does not provide any access-control mechanism and recommends to restrict access via a web server's basic auth capabilities.<\/p>\n<p>Attackers that are able to create files can trigger an XSS vulnerability by creating a file that contains an XSS payload in its filename. Since the application supports versioning via git in its paid version, the vulnerability might be exploitable by an attacker with access to the remote git repository.<\/p>\n<h3>Proof of Concept<\/h3>\n<p>Use the \"New file\" button to create a file named:\u00a0<\/p>\n<div>\n<div><strong>&lt;img src onerror=\"alert(document.domain)&gt;<\/strong><\/div>\n<\/div>\n<p>The XSS is triggered in the file listing, as shown in the following screenshot.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2024\/07\/hugocms_xss-filename-300x119.png\" alt=\"\" class=\"wp-image-22928 alignnone size-medium\" width=\"497\" height=\"197\" srcset=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2024\/07\/hugocms_xss-filename-300x119.png 497w, https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2024\/07\/hugocms_xss-filename-480x190.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 497px, 100vw\" \/><\/p>\n<h3>Timeline<\/h3>\n<ul>\n<li><strong>2023-09-25<\/strong>: Vulnerability identified by Florian Dewald.<\/li>\n<li><strong>2023-10-02<\/strong>: Sent first contact request.<\/li>\n<li><strong>2023-10-16<\/strong>: Sent reminder email mentioning disclosure deadline.<\/li>\n<li><strong>2023-10-25<\/strong>: Sent another reminder stressing that vulnerabilities will be publicly disclosed.<\/li>\n<li><strong>2023-11-13<\/strong>: Sent another reminder stressing our deadline and that vulnerabilities will be publicly disclosed if we receive no answer.<\/li>\n<li><strong>2023-11-22<\/strong>: Reached vendor via phone, sent vulnerability information.<\/li>\n<li><strong>2023-12-04<\/strong>: Sent status update request to info@inter-data.de<\/li>\n<li><strong>2023-12-06<\/strong>: Inter-Data reports that a fix is being worked on.<\/li>\n<li><strong>2024-01-03<\/strong>: According to Inter-Data a fix is in the works and should be finished soon.<\/li>\n<li><strong>2024-01-24<\/strong>: Reached out to Inter-Data for another status update.<\/li>\n<li><strong>2024-01-26<\/strong>: Inter-Data reports that the vulnerability is fixed.<\/li>\n<li><strong>2024-07-18<\/strong>: This advisory is published.<\/li>\n<\/ul>\n<h3>Credits<\/h3>\n<p>This security vulnerability was identified by Florian Dewald of usd AG.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>usd-2023-0033 | Cross-Site Scripting in hugocms Advisory ID: usd-2023-0033Product: hugocmsAffected Version: (latest as of 25.09.2023; commit 77443d6)Vulnerability Type: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')Security Risk: HIGHVendor URL: https:\/\/hugoeditor.com\/Vendor acknowledged vulnerability: YesVendor Status: FixedAdvisory Status: PublishedCVE Number: CVE-2023-49324First Published: 2024-07-18Last Update: 2024-07-18 Desciption The application hugocms, developed by Inter-Data, provides a [&hellip;]<\/p>\n","protected":false},"author":118,"featured_media":0,"parent":16124,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-22931","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/22931","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/users\/118"}],"replies":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/comments?post=22931"}],"version-history":[{"count":5,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/22931\/revisions"}],"predecessor-version":[{"id":23071,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/22931\/revisions\/23071"}],"up":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16124"}],"wp:attachment":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/media?parent=22931"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}