-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| Dpaste | pip | < 3.8 | 3.8 |
The vulnerability stems from improper output encoding in error responses generated by the API endpoint. The commit diff shows two critical changes: 1) Added HTML escaping for the 'lexer' parameter in syntax validation error messages 2) Added HTML escaping for the 'expires' parameter in expiration validation error messages. Both parameters were previously inserted into responses without proper sanitization using standard Django escaping (django.utils.html.escape). The vulnerable code paths reside in the post method handler that processes user submissions, specifically in the parameter validation sections that return error responses containing reflected user input.
A Semantic Attack on Google Gemini - Read the Latest Research