Miggo Logo

CVE-2020-15275: malicious SVG attachment causing stored XSS vulnerability

8.7

CVSS Score
3.1

Basic Information

EPSS Score
0.52709%
Published
11/11/2020
Updated
10/7/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
moinpip< 1.9.111.9.11

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from SVG files not being properly sanitized or protected against inline execution. The commit diff shows 'image/svg+xml' was added to 'mimetypes_xss_protect' in MoinMoin/config/multiconfig.py. This list determines which MIME types trigger XSS protections (like forcing download instead of inline rendering). The absence of SVG in this list prior to the patch meant uploaded SVGs were rendered inline, enabling XSS. The DefaultConfig.init method initializes this critical security configuration, making it the root cause.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t *n *tt**k*r wit* `writ*` p*rmissions **n uplo** *n SV* *il* t**t *ont*ins m*li*ious j*v*s*ript. T*is j*v*s*ript will ** *x**ut** in * us*r's *rows*r w**n t** us*r is vi*win* t**t SV* *il* on t** wiki. ### P*t***s Us*rs *r* stron*ly **vis*

Reasoning

T** vuln*r**ility st*ms *rom SV* *il*s not **in* prop*rly s*nitiz** or prot**t** ***inst inlin* *x**ution. T** *ommit *i** s*ows 'im***/sv*+xml' w*s ***** to 'mim*typ*s_xss_prot**t' in MoinMoin/*on*i*/multi*on*i*.py. T*is list **t*rmin*s w*i** MIM* t