Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. malojaserver
  4. ›
  5. GMS-2023-6515

GMS-2023-6515: Maloja error page XSS vulnerability

December 18, 2023

Impact

The error page for a missing path echoes the path back to the user. If this contains HTML, an attacker could execute a script on the user’s machine inside the Maloja context and perform authorized actions like scrobbling or deleting scrobbles. This does not affect the security of your server. The exploit is purely client-side. Since there is very little incentive to mess with your scrobble data and it requires very specific targeting (an attacker would have to send a user a link to their own server), the severity rating might be misleading.

Patches

The Vulnerability is patched in 3.2.2

References

  • github.com/advisories/GHSA-4h72-34j6-j8x7
  • github.com/krateng/maloja/commit/febaff97228b37a192f2630aa331cac5e5c3e98e
  • github.com/krateng/maloja/security/advisories/GHSA-4h72-34j6-j8x7

Code Behaviors & Features

Detect and mitigate GMS-2023-6515 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 3.2.2

Fixed versions

  • 3.2.2

Solution

Upgrade to version 3.2.2 or above.

Source file

pypi/malojaserver/GMS-2023-6515.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:27 +0000.