Cross-site Scripting (XSS) Affecting syncthing package, versions <1.27.2~ds4-1


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.51% (66th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Scripting (XSS) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIANUNSTABLE-SYNCTHING-5702244
  • published13 Jun 2023
  • disclosed6 Jun 2023

Introduced: 6 Jun 2023

CVE-2022-46165  (opens in a new tab)
CWE-79  (opens in a new tab)

How to fix?

Upgrade Debian:unstable syncthing to version 1.27.2~ds4-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream syncthing package and not the syncthing package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

Syncthing is an open source, continuous file synchronization program. In versions prior to 1.23.5 a compromised instance with shared folders could sync malicious files which contain arbitrary HTML and JavaScript in the name. If the owner of another device looks over the shared folder settings and moves the mouse over the latest sync, a script could be executed to change settings for shared folders or add devices automatically. Additionally adding a new device with a malicious name could embed HTML or JavaScript inside parts of the page. As a result the webUI may be subject to a stored cross site scripting attack. This issue has been addressed in version 1.23.5. Users are advised to upgrade. Users unable to upgrade should avoid sharing folders with untrusted users.

CVSS Base Scores

version 3.1