CVE-2023-49277:
Reflected XSS Vulnerability in dpaste
6.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.64407%
CWE
Published
12/1/2023
Updated
12/7/2023
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
Dpaste | pip | < 3.8 | 3.8 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper output encoding in error responses generated by the API endpoint. The commit diff shows two critical changes: 1) Added HTML escaping for the 'lexer' parameter in syntax validation error messages 2) Added HTML escaping for the 'expires' parameter in expiration validation error messages. Both parameters were previously inserted into responses without proper sanitization using standard Django escaping (django.utils.html.escape). The vulnerable code paths reside in the post method handler that processes user submissions, specifically in the parameter validation sections that return error responses containing reflected user input.