Miggo Logo

CVE-2023-41048: plone.namedfile vulnerable to Stored Cross Site Scripting with SVG images

3.7

CVSS Score
3.1

Basic Information

EPSS Score
0.65085%
Published
9/21/2023
Updated
11/9/2023
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
plone.namedfilepip< 5.6.15.6.1
plone.namedfilepip>= 6.0.0, < 6.0.36.0.3
plone.namedfilepip>= 6.1.0, < 6.1.36.1.3
plone.namedfilepip>= 6.2.0, < 6.2.16.2.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper handling of scaled SVG images. The patches introduced _should_force_download and modified set_headers to enforce download headers based on MIME type checks. Prior to the fix, the ImageScale's index_html and HEAD methods served scaled SVGs without these protections. The test cases added in the commit verify that scale views (e.g., /@@images/.../custom) now force downloads for SVGs, confirming the vulnerable code paths were in the scaling handlers.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t T**r* is * stor** *ross sit* s*riptin* vuln*r**ility *or SV* im***s. * [s**urity *ot*ix *rom ****](*ttps://*it*u*.*om/plon*/Pro*u*ts.Plon**ot*ix********) *lr***y p*rti*lly *ix** t*is, *y m*kin* sur* SV* im***s *r* *lw*ys *ownlo**** inst**

Reasoning

T** vuln*r**ility st*ms *rom improp*r **n*lin* o* s**l** SV* im***s. T** p*t***s intro*u*** _s*oul*_*or**_*ownlo** *n* mo*i*i** s*t_*****rs to *n*or** *ownlo** *****rs **s** on MIM* typ* ****ks. Prior to t** *ix, t** Im***S**l*'s in**x_*tml *n* ****