CVE-2024-41675: CKAN has Cross-site Scripting vector in the Datatables view plugin
6.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.52565%
CWE
Published
8/21/2024
Updated
8/21/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
ckan | pip | >= 2.7.0, < 2.10.5 | 2.10.5 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from unescaped data handling in the ajax endpoint of datatables_view plugin. The commit diff shows the fix added HTML escaping to the record construction loop in blueprint.py. The original code used 'str()' conversion without escaping (CWE-79), while the patched version wraps it with 'html.escape()'. The test case added in test_ajax.py demonstrates the XSS payload 'a < b && a > 0' gets properly escaped to 'a < b && a > 0' in responses, confirming the vulnerable data flow path.