Skip to content
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
42 changes: 42 additions & 0 deletions gems/publify_core/CVE-2024-39311.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,42 @@
---
gem: publify_core
cve: 2024-39311
ghsa: 8fm5-gg2f-f66q
url: https://github.com/publify/publify/security/advisories/GHSA-8fm5-gg2f-f66q
title: Publify Vulnerable To Cross-Site Scripting (XSS) Via
Redirects Requiring User Interaction
date: 2025-03-28
description: |
### Summary

A publisher on a `publify` application is able to perform a cross-site
scripting attack on an administrator using the redirect functionality.

### Details

A publisher on a `publify` application is able to perform a cross-site
scripting attack on an administrator using the redirect functionality.
The exploitation of this XSS vulnerability requires the administrator
to click a malicious link.

We can create a redirect to a `javascript:alert()` URL. Whilst the
redirect itself doesn't work, on the administrative panel, an a tag
is created with the payload as the URI. Upon clicking this link,
the XSS is triggered.

An attack could attempt to hide their payload by using HTML, or
other encodings, as to not make it obvious to an administrator
that this is a malicious link.

### Impact

A publisher may attempt to use this vulnerability to escalate their
privileges and become an administrator."
cvss_v4: 1.8
patched_versions:
- ">= 10.0.2"
related:
url:
- https://nvd.nist.gov/vuln/detail/CVE-2024-39311
- https://github.com/publify/publify/security/advisories/GHSA-8fm5-gg2f-f66q
- https://github.com/advisories/GHSA-8fm5-gg2f-f66q