Cross-site Scripting (XSS) Affecting medis package, versions *


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.14% (50th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Scripting (XSS) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDnpm:medis:20171201
  • published28 Jun 2018
  • disclosed1 Dec 2017
  • creditsilviavali

Introduced: 1 Dec 2017

CVE-2018-1000536  (opens in a new tab)
CWE-79  (opens in a new tab)

How to fix?

There is no fix version for medis.

Overview

medis is a Mac database management application for Redis.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) attacks which can lead to code execution due to an enabled node integration. When a victim synchronizes data from the redis server, an attack may occur if the server contains a malicious key value.

PoC by silvia vali:

If an attacker provides the following as a key:

<s <onmouseover="alert(1)"> <s onmouseover="var {shell} = require('electron'); shell.openExternal('file:/etc/passwd'); alert('XSS to RCE')">Hallo</s>

If the user now hovers over the key name, the payload will be executed when the user hovers over the key name. An alert box will pop up and open the /etc/passwd file from the user’s machine.

Details

<>

References

CVSS Scores

version 3.1