8.9 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): REQUIRED
- Scope (S): CHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): LOW
by @mweinelt Activity log
- Created automatic suggestion
- @mweinelt removed package filebrowser
- @mweinelt removed package python312Packages.filebrowser-safe
- @mweinelt removed package python313Packages.filebrowser-safe
- @mweinelt removed package python314Packages.filebrowser-safe
- @mweinelt accepted
- @mweinelt published on GitHub
FileBrowser Quantum: Stored XSS in public share page via unsanitized share metadata (text/template misuse)
FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-beta and 1.2.2-stable, Stored XSS is possible via share metadata fields (e.g., title, description) that are rendered into HTML for /public/share/<hash> without context-aware escaping. The server uses text/template instead of html/template, allowing injected scripts to execute when victims visit the share URL. This vulnerability is fixed in 1.3.1-beta and 1.2.2-stable.
References
-
https://github.com/gtsteffaniak/filebrowser/releases/tag/v1.3.1-beta x_refsource_MISC
Affected products
- ==>= 1.3.0-beta, < 1.3.1-beta
- ==< 1.2.2-stable
Matching in nixpkgs
pkgs.filebrowser-quantum
Access and manage your files from the web
-
nixos-unstable 1.1.0-stable
- nixpkgs-unstable 1.1.0-stable
- nixos-unstable-small 1.1.0-stable
Package maintainers
-
@JocimSus Joachim Susatiyo <joe.susatiyo@gmail.com>