Miggo Logo

CVE-2024-34061: changedetection.io Cross-site Scripting vulnerability

4.3

CVSS Score
3.1

Basic Information

EPSS Score
0.94663%
Published
5/3/2024
Updated
5/3/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
changedetection.iopip< 0.45.220.45.22

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the error message construction in ValidateAppRiseServers validator. The code at line 226 uses string formatting to include user-supplied 'server_url' in validation errors ('%s' substitution). As shown in the PoC, when malicious HTML/JS is entered in notification_urls, it gets reflected unsanitized in the response. The lack of output encoding when rendering error messages containing user input enables XSS. The function is clearly identified in the vulnerability details and matches the attack vector described.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry Input in p*r*m*t*r noti*i**tion_urls is not pro**ss** r*sultin* in j*v*s*ript *x**ution in t** *ppli**tion ### **t*ils ***n****t**tion.io v*rsion: v*.**.** *ttps://*it*u*.*om/**tlmoon/***n****t**tion.io/*lo*/*.**.**/***n****t**tionio/*

Reasoning

T** vuln*r**ility st*ms *rom t** *rror m*ss*** *onstru*tion in V*li**t**ppRis*S*rv*rs v*li**tor. T** *o** *t lin* *** us*s strin* *orm*ttin* to in*lu** us*r-suppli** 's*rv*r_url' in v*li**tion *rrors ('%s' su*stitution). *s s*own in t** Po*, w**n m*l