Miggo Logo

CVE-2018-12104: Airbnb Knowledge Repo XSS In Comments

6.1

CVSS Score
3.0

Basic Information

EPSS Score
0.43252%
Published
5/14/2022
Updated
9/27/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
knowledge-repopip< 0.9.00.9.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The GitHub patch shows the vulnerability was fixed by adding Flask's escape() to sanitize data['text'] in the post_comment route handler. This function processes user-submitted comments and previously lacked input sanitization, making it the clear injection point. The CVE description explicitly implicates the post comments functionality, and the patch's narrow scope (only modifying this function) confirms this as the primary vulnerability source.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*ross-sit* s*riptin* (XSS) vuln*r**ility in *ir*n* Knowl**** R*po prior to *.*.* *llows r*mot* *tt**k*rs to inj**t *r*itr*ry w** s*ripts or *TML vi* t** post *omm*nts *un*tion*lity, *s **monstr*t** *y t** `post/posts/n*w_r*port.kp` URI.

Reasoning

T** *it*u* p*t** s*ows t** vuln*r**ility w*s *ix** *y ***in* `*l*sk's *s**p*()` to s*nitiz* `**t*['t*xt']` in t** `post_*omm*nt` rout* **n*l*r. T*is *un*tion pro**ss*s us*r-su*mitt** *omm*nts *n* pr*viously l**k** input s*nitiz*tion, m*kin* it t** *l