CVE-2012-6131: Roundup Cross-site scripting (XSS) vulnerability
4.3
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.60343%
CWE
Published
5/17/2022
Updated
10/21/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
AV:N/AC:M/Au:N/C:N/I:P/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
roundup | pip | < 1.4.20 | 1.4.20 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the @action
parameter in cgi/client.py
not being sanitized before being included in an error message. The GitHub commit diff shows the fix added cgi.escape(action_name)
to the ValueError
raised in get_action_class
, confirming the lack of escaping was the root cause. The CVE description explicitly references the @action
parameter and cgi/client.py
, aligning with this function's role in processing actions. Other functions (e.g., in templating.py
) were patched for XSS but relate to different CVEs (e.g., CVE-2012-6130).