Skip to content

Commit 84afd78

Browse files
ulidtkoblackheaven
authored andcommitted
HSEC-2024-0001: host header rXSS in keter
1 parent 20d471d commit 84afd78

File tree

1 file changed

+30
-0
lines changed

1 file changed

+30
-0
lines changed
Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
```toml
2+
[advisory]
3+
id = "HSEC-2024-0001"
4+
cwe = [79]
5+
keywords = ["http", "xss", "rxss", "historic"]
6+
7+
[[references]]
8+
type = "FIX"
9+
url = "https://github.com/snoyberg/keter/pull/246"
10+
11+
[[affected]]
12+
package = "keter"
13+
cvss = "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N"
14+
declarations."Keter.Proxy.toResponse" = ">= 0.3.4 && < 1.0.1"
15+
declarations."Keter.Proxy.unknownHostResponse" = ">= 1.0.1 && < 1.8.4"
16+
17+
[[affected.versions]]
18+
introduced = "0.3.4"
19+
fixed = "1.8.4"
20+
```
21+
22+
# Reflected XSS vulnerability in keter
23+
24+
Keter is an app-server/reverse-proxy often used with webapps build on Yesod web-framework.
25+
26+
In the logic handling VHost dispatch, Keter was echoing back `Host` header value, unescaped,
27+
as part of an HTML error page. This constitutes a reflected-XSS vulnerability. Although
28+
not readily exploitable directly from a browser (where `Host` header can't generally assume
29+
arbitrary values), it may become such in presence of further weaknesses in components
30+
upstream of Keter in the http proxying chain. Therefore, AC:High in CVSS evaluation.

0 commit comments

Comments
 (0)