Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. kiwitcms/Kiwi
  4. ›
  5. CVE-2023-27489

CVE-2023-27489: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

March 30, 2023

Kiwi TCMS is an open source test management system for both manual and automated testing. Kiwi TCMS accepts SVG files uploaded by users which could potentially contain JavaScript code. If SVG images are viewed directly, i.e. not rendered in an HTML page, this JavaScript code could execute. This vulnerability has been fixed by configuring Kiwi TCMS to serve with the Content-Security-Policy HTTP header which blocks inline JavaScript in all modern browsers. This configuration change is provided in version 12.1 and users are advised to upgrade. Users unable to upgrade may set their Content-Security-Policy HTTP header manually.

References

  • github.com/advisories/GHSA-2wcr-87wf-cf9j
  • github.com/kiwitcms/Kiwi/commit/6617cee0fb70cc394b7be6bbc86ef84e6e9de077
  • github.com/kiwitcms/Kiwi/security/advisories/GHSA-2wcr-87wf-cf9j
  • nvd.nist.gov/vuln/detail/CVE-2023-27489

Code Behaviors & Features

Detect and mitigate CVE-2023-27489 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 12.1

Fixed versions

  • 12.1

Solution

Upgrade to version 12.1 or above.

Impact 5.4 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Source file

pypi/kiwitcms/Kiwi/CVE-2023-27489.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:16:09 +0000.