Miggo Logo

CVE-2024-36115: Reposilite artifacts vulnerable to Stored Cross-site Scripting

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.84007%
Published
8/2/2024
Updated
11/4/2024
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
com.reposilite:reposilite-backendmaven>= 3.3.0, < 3.5.123.5.12

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from serving untrusted content (artifacts/Javadocs) without proper security headers. The commit diffs show both locations were patched by adding 'Content-Security-Policy: sandbox' headers. The first function (resultAttachment) handles general artifact content delivery, while the second (handleRawJavadocResource) deals with Javadoc resources. Both failed to enforce origin isolation pre-patch, enabling XSS via injected scripts. The high confidence comes from direct correlation between the vulnerability description, remediation steps, and the patched functions in the provided commit data.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry R*posilit* v*.*.** is *****t** *y Stor** *ross-Sit* S*riptin* (XSS) w**n *ispl*yin* *rti***t's *ont*nt in t** *rows*r. ### **t*ils *s * M*v*n r*pository m*n***r, R*posilit* provi**s t** **ility to vi*w t** *rti***ts *ont*nt in t** *rows*

Reasoning

T** vuln*r**ility st*ms *rom s*rvin* untrust** *ont*nt (*rti***ts/J*v**o*s) wit*out prop*r s**urity *****rs. T** *ommit *i**s s*ow *ot* lo**tions w*r* p*t**** *y ***in* '*ont*nt-S**urity-Poli*y: s*n**ox' *****rs. T** *irst *un*tion (r*sult*tt***m*nt)