CVE-2022-46181
CVSS V2 None
CVSS V3 None
Description
Gotify server is a simple server for sending and receiving messages in real-time per WebSocket. Versions prior to 2.2.2 contain an XSS vulnerability that allows authenticated users to upload .html files. An attacker could execute client side scripts **if** another user opened a link. The attacker could potentially take over the account of the user that clicked the link. The Gotify UI won't natively expose such a malicious link, so an attacker has to get the user to open the malicious link in a context outside of Gotify. The vulnerability has been fixed in version 2.2.2. As a workaround, you can block access to non image files via a reverse proxy in the `./image` directory.
Overview
- CVE ID
- CVE-2022-46181
- Assigner
- security-advisories@github.com
- Vulnerability Status
- Analyzed
- Published Version
- 2022-12-29T19:15:08
- Last Modified Date
- 2023-01-09T19:56:00
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:gotify:server:*:*:*:*:*:*:*:* | 1 | OR | 2.2.2 |
References
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-46181 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46181 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-12-29 20:15:01 | Added to TrackCVE | |||
2022-12-29 20:15:01 | Weakness Enumeration | new | ||
2022-12-29 23:14:43 | 2022-12-29T22:24:55 | CVE Modified Date | updated | |
2022-12-29 23:14:43 | Received | Awaiting Analysis | Vulnerability Status | updated |
2023-01-05 12:18:54 | Awaiting Analysis | Undergoing Analysis | Vulnerability Status | updated |
2023-01-09 20:19:55 | 2023-01-09T19:56:00 | CVE Modified Date | updated | |
2023-01-09 20:19:55 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |
2023-01-09 20:19:58 | CPE Information | updated |