We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-39311

Publify Vulnerable To Cross-Site Scripting (XSS) Via Redirects Requiring User Interaction



Description

Publify is a self hosted Web publishing platform on Rails. Prior to version 10.0.1 of Publify, corresponding to versions prior to 10.0.2 of the `publify_core` rubygem, publisher on a `publify` application is able to perform a cross-site scripting (XSS) attack on an administrator using the redirect functionality. The exploitation of this XSS vulnerability requires the administrator to click a malicious link. An attack could attempt to hide their payload by using HTML, or other encodings, as to not make it obvious to an administrator that this is a malicious link. A publisher may attempt to use this vulnerability to escalate their privileges and become an administrator. Version 10.0.1 of Publify and version 10.0.2 of the `publify_core` rubygem fix the issue.

Reserved 2024-06-21 | Published 2025-03-28 | Updated 2025-03-28 | Assigner GitHub_M


LOW: 1.8CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:P

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

< 10.0.1
affected

References

github.com/...ublify/security/advisories/GHSA-8fm5-gg2f-f66q

cve.org (CVE-2024-39311)

nvd.nist.gov (CVE-2024-39311)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-39311

Support options

Helpdesk Chat, Email, Knowledgebase