Reflected XSS Vulnerability in dpaste
Moderate severity
GitHub Reviewed
Published
Dec 1, 2023
in
DarrenOfficial/dpaste
•
Updated Dec 7, 2023
Description
Published to the GitHub Advisory Database
Dec 1, 2023
Reviewed
Dec 1, 2023
Published by the National Vulnerability Database
Dec 1, 2023
Last updated
Dec 7, 2023
Impact
A security vulnerability has been identified in the expires parameter of the dpaste API, allowing for a POST Reflected XSS attack. This vulnerability can be exploited by an attacker to execute arbitrary JavaScript code in the context of a user's browser, potentially leading to unauthorized access, data theft, or other malicious activities.
Patches
Workarounds
At this time, the recommended course of action is to apply the provided patch to the affected systems. No known workarounds have been identified, and applying the patch is the most effective way to remediate the vulnerability.
References