Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerabilities in an interactive lesson.
Start learningThere is no fixed version for archivebox
.
archivebox is a The self-hosted internet archive.
Affected versions of this package are vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') due to the wget
extractor. An attacker can potentially act using your logged-in admin credentials and add/remove/modify
snapshots and ArchiveBox
users, and generally do anything an admin user could do by viewing an archived malicious page designed to target your ArchiveBox instance.
Note: This is only exploitable if you are logged in to the ArchiveBox admin site in the same browser session and view an archived malicious page.
This vulnerability can be mitigated by disabling the wget extractor by setting archivebox config --set SAVE_WGET=False
, ensuring you are always logged out, or serving only a static HTML version of your archive.
<a href="archive/1557816881/twitter.com/garethheyes/status/1126526480614416395.html" title="\u2028\u2029 op Twitter: "Another way to use throw without a semi-colon:
<script>{onerror=alert}throw 1</script>"">