Summary
A cross-site scripting (XSS) vulnerability was identified in the PasswordPusher application, affecting versions v1.41.1
through v.1.48.0
.
The issue arises from an un-sanitized parameter which could allow attackers to inject malicious JavaScript into the application.
Impact
Users who self-host and have the login system enabled are affected. Exploitation of this vulnerability could expose user data, access to user sessions or take unintended actions on behalf of users.
To exploit this vulnerability, an attacker would need to convince a user to click a malicious account confirmation link. If exploited, data in the target user's account alone could potentially be at risk.
As of the date of this advisory, there have not been any reports of this vulnerability being exploited.
It is highly recommended to update to version v1.48.1
or later to mitigate this risk.
Solution
Update to version v1.48.1
or later where input sanitization has been applied to the account confirmation process.
Credits
Thanks to @igniter07 for appropriately disclosing this vulnerability and providing paths to resolution. The community and project is better protected because of this report and we say thanks!
Summary
A cross-site scripting (XSS) vulnerability was identified in the PasswordPusher application, affecting versions
v1.41.1
throughv.1.48.0
.The issue arises from an un-sanitized parameter which could allow attackers to inject malicious JavaScript into the application.
Impact
Users who self-host and have the login system enabled are affected. Exploitation of this vulnerability could expose user data, access to user sessions or take unintended actions on behalf of users.
To exploit this vulnerability, an attacker would need to convince a user to click a malicious account confirmation link. If exploited, data in the target user's account alone could potentially be at risk.
As of the date of this advisory, there have not been any reports of this vulnerability being exploited.
It is highly recommended to update to version
v1.48.1
or later to mitigate this risk.Solution
Update to version
v1.48.1
or later where input sanitization has been applied to the account confirmation process.Credits
Thanks to @igniter07 for appropriately disclosing this vulnerability and providing paths to resolution. The community and project is better protected because of this report and we say thanks!