CVE-2023-32193: Norman API Cross-site Scripting Vulnerability
8.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.22489%
CWE
Published
2/8/2024
Updated
10/16/2024
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/rancher/norman | go | < 0.0.0-20240207153100-3bb70b772b52 | 0.0.0-20240207153100-3bb70b772b52 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from two key areas: 1) In html.go, user-controlled URLs were inserted into HTML attributes without OWASP-recommended attribute encoding, as evidenced by the addition of encodeAttribute in the patch. 2) In url.go, the previous string-based URL construction method didn't properly escape path components, allowing XSS payloads in URLs. The patches specifically address these by introducing attribute encoding and using url.URL's safe path construction methods.