Search criteria

1 vulnerability by pannellum

CVE-2019-16763 (GCVE-0-2019-16763)

Vulnerability from cvelistv5 – Published: 2019-11-22 18:26 – Updated: 2024-08-05 01:24
VLAI?
Title
XSS in Pannellum from 2.5.0 through 2.5.4
Summary
In Pannellum from 2.5.0 through 2.5.4 URLs were not sanitized for data URIs (or vbscript:), allowing for potential XSS attacks. Such an attack would require a user to click on a hot spot to execute and would require an attacker-provided configuration. The most plausible potential attack would be if pannellum.htm was hosted on a domain that shared cookies with the targeted site's user authentication; an <iframe> could then be embedded on the attacker's site using pannellum.htm from the targeted site, which would allow the attacker to potentially access information from the targeted site as the authenticated user (or worse if the targeted site did not have adequate CSRF protections) if the user clicked on a hot spot in the attacker's embedded panorama viewer. This was patched in version 2.5.5.
CWE
  • CWE-79 - Cross-site Scripting (XSS)
Assigner
Impacted products
Vendor Product Version
mpretroff pannellum Affected: 2.5.0
Affected: 2.5.1
Affected: 2.5.2
Affected: 2.5.3
Affected: 2.5.4
Create a notification for this product.
Credits
Thank you to Max Schaefer of GitHub Security Lab for reporting this issue.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T01:24:48.382Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/mpetroff/pannellum/security/advisories/GHSA-m52x-29pq-w3vv"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/mpetroff/pannellum/commit/cc2f3d99953de59db908e0c6efd1c2c17f7c6914"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "pannellum",
          "vendor": "mpretroff",
          "versions": [
            {
              "status": "affected",
              "version": "2.5.0"
            },
            {
              "status": "affected",
              "version": "2.5.1"
            },
            {
              "status": "affected",
              "version": "2.5.2"
            },
            {
              "status": "affected",
              "version": "2.5.3"
            },
            {
              "status": "affected",
              "version": "2.5.4"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Thank you to Max Schaefer of GitHub Security Lab for reporting this issue."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Pannellum from 2.5.0 through 2.5.4 URLs were not sanitized for data URIs (or vbscript:), allowing for potential XSS attacks. Such an attack would require a user to click on a hot spot to execute and would require an attacker-provided configuration. The most plausible potential attack would be if pannellum.htm was hosted on a domain that shared cookies with the targeted site\u0027s user authentication; an \u0026lt;iframe\u0026gt; could then be embedded on the attacker\u0027s site using pannellum.htm from the targeted site, which would allow the attacker to potentially access information from the targeted site as the authenticated user (or worse if the targeted site did not have adequate CSRF protections) if the user clicked on a hot spot in the attacker\u0027s embedded panorama viewer. This was patched in version 2.5.5."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Cross-site Scripting (XSS)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-11-22T18:26:09",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/mpetroff/pannellum/security/advisories/GHSA-m52x-29pq-w3vv"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/mpetroff/pannellum/commit/cc2f3d99953de59db908e0c6efd1c2c17f7c6914"
        }
      ],
      "source": {
        "advisory": "GHSA-m52x-29pq-w3vv",
        "discovery": "EXTERNAL"
      },
      "title": "XSS in Pannellum from 2.5.0 through 2.5.4",
      "workarounds": [
        {
          "lang": "en",
          "value": "Don\u0027t host pannellum.htm on a domain that shares cookies with user authentication."
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security-advisories@github.com",
          "ID": "CVE-2019-16763",
          "STATE": "PUBLIC",
          "TITLE": "XSS in Pannellum from 2.5.0 through 2.5.4"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "pannellum",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_name": "2.5.0",
                            "version_value": "2.5.0"
                          },
                          {
                            "version_affected": "=",
                            "version_name": "2.5.1",
                            "version_value": "2.5.1"
                          },
                          {
                            "version_affected": "=",
                            "version_name": "2.5.2",
                            "version_value": "2.5.2"
                          },
                          {
                            "version_affected": "=",
                            "version_name": "2.5.3",
                            "version_value": "2.5.3"
                          },
                          {
                            "version_affected": "=",
                            "version_name": "2.5.4",
                            "version_value": "2.5.4"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "mpretroff"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "Thank you to Max Schaefer of GitHub Security Lab for reporting this issue."
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Pannellum from 2.5.0 through 2.5.4 URLs were not sanitized for data URIs (or vbscript:), allowing for potential XSS attacks. Such an attack would require a user to click on a hot spot to execute and would require an attacker-provided configuration. The most plausible potential attack would be if pannellum.htm was hosted on a domain that shared cookies with the targeted site\u0027s user authentication; an \u0026lt;iframe\u0026gt; could then be embedded on the attacker\u0027s site using pannellum.htm from the targeted site, which would allow the attacker to potentially access information from the targeted site as the authenticated user (or worse if the targeted site did not have adequate CSRF protections) if the user clicked on a hot spot in the attacker\u0027s embedded panorama viewer. This was patched in version 2.5.5."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:L/A:N",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-79 Cross-site Scripting (XSS)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/mpetroff/pannellum/security/advisories/GHSA-m52x-29pq-w3vv",
              "refsource": "CONFIRM",
              "url": "https://github.com/mpetroff/pannellum/security/advisories/GHSA-m52x-29pq-w3vv"
            },
            {
              "name": "https://github.com/mpetroff/pannellum/commit/cc2f3d99953de59db908e0c6efd1c2c17f7c6914",
              "refsource": "MISC",
              "url": "https://github.com/mpetroff/pannellum/commit/cc2f3d99953de59db908e0c6efd1c2c17f7c6914"
            }
          ]
        },
        "source": {
          "advisory": "GHSA-m52x-29pq-w3vv",
          "discovery": "EXTERNAL"
        },
        "work_around": [
          {
            "lang": "en",
            "value": "Don\u0027t host pannellum.htm on a domain that shares cookies with user authentication."
          }
        ]
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2019-16763",
    "datePublished": "2019-11-22T18:26:09",
    "dateReserved": "2019-09-24T00:00:00",
    "dateUpdated": "2024-08-05T01:24:48.382Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}