CVE-2024-32875 (GCVE-0-2024-32875)
Vulnerability from cvelistv5 – Published: 2024-04-23 20:23 – Updated: 2024-08-02 02:20
VLAI?
Summary
Hugo is a static site generator. Starting in version 0.123.0 and prior to version 0.125.3, title arguments in Markdown for links and images not escaped in internal render hooks. Hugo users who are impacted are those who have these hooks enabled and do not trust their Markdown content files. The issue is patched in v0.125.3. As a workaround, replace the templates with user defined templates or disable the internal templates.
Severity ?
6.1 (Medium)
CWE
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:gohugo:hugo:0.123.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "hugo",
"vendor": "gohugo",
"versions": [
{
"lessThan": "0.125.3",
"status": "affected",
"version": "0.123.0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-32875",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-04-29T19:39:12.988615Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:51:21.525Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T02:20:35.602Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://github.com/gohugoio/hugo/security/advisories/GHSA-ppf8-hhpp-f5hj",
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/gohugoio/hugo/security/advisories/GHSA-ppf8-hhpp-f5hj"
},
{
"name": "https://github.com/gohugoio/hugo/releases/tag/v0.125.3",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/gohugoio/hugo/releases/tag/v0.125.3"
},
{
"name": "https://gohugo.io/getting-started/configuration-markup/#renderhooksimageenabledefault",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://gohugo.io/getting-started/configuration-markup/#renderhooksimageenabledefault"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "hugo",
"vendor": "gohugoio",
"versions": [
{
"status": "affected",
"version": "\u003e= 0.123.0, \u003c 0.125.3"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Hugo is a static site generator. Starting in version 0.123.0 and prior to version 0.125.3, title arguments in Markdown for links and images not escaped in internal render hooks. Hugo users who are impacted are those who have these hooks enabled and do not trust their Markdown content files. The issue is patched in v0.125.3. As a workaround, replace the templates with user defined templates or disable the internal templates."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-80",
"description": "CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-04-23T20:23:42.535Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/gohugoio/hugo/security/advisories/GHSA-ppf8-hhpp-f5hj",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/gohugoio/hugo/security/advisories/GHSA-ppf8-hhpp-f5hj"
},
{
"name": "https://github.com/gohugoio/hugo/releases/tag/v0.125.3",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/gohugoio/hugo/releases/tag/v0.125.3"
},
{
"name": "https://gohugo.io/getting-started/configuration-markup/#renderhooksimageenabledefault",
"tags": [
"x_refsource_MISC"
],
"url": "https://gohugo.io/getting-started/configuration-markup/#renderhooksimageenabledefault"
}
],
"source": {
"advisory": "GHSA-ppf8-hhpp-f5hj",
"discovery": "UNKNOWN"
},
"title": "Hugo doesn\u0027t escape markdown title in internal render hooks"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2024-32875",
"datePublished": "2024-04-23T20:23:42.535Z",
"dateReserved": "2024-04-19T14:07:11.229Z",
"dateUpdated": "2024-08-02T02:20:35.602Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"Hugo is a static site generator. Starting in version 0.123.0 and prior to version 0.125.3, title arguments in Markdown for links and images not escaped in internal render hooks. Hugo users who are impacted are those who have these hooks enabled and do not trust their Markdown content files. The issue is patched in v0.125.3. As a workaround, replace the templates with user defined templates or disable the internal templates.\"}, {\"lang\": \"es\", \"value\": \"Hugo es un generador de sitios est\\u00e1ticos. A partir de la versi\\u00f3n 0.123.0 y antes de la versi\\u00f3n 0.125.3, los argumentos de t\\u00edtulo en Markdown para enlaces e im\\u00e1genes no escaparon en ganchos de renderizado internos. Los usuarios de Hugo que se ven afectados son aquellos que tienen estos enlaces habilitados y no conf\\u00edan en sus archivos de contenido de Markdown. El problema se solucion\\u00f3 en v0.125.3. Como workaround, reemplace las plantillas con plantillas definidas por el usuario o desactive las plantillas internas.\"}]",
"id": "CVE-2024-32875",
"lastModified": "2024-11-21T09:15:54.960",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\", \"baseScore\": 6.1, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 2.7}]}",
"published": "2024-04-23T21:15:48.837",
"references": "[{\"url\": \"https://github.com/gohugoio/hugo/releases/tag/v0.125.3\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/gohugoio/hugo/security/advisories/GHSA-ppf8-hhpp-f5hj\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://gohugo.io/getting-started/configuration-markup/#renderhooksimageenabledefault\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/gohugoio/hugo/releases/tag/v0.125.3\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://github.com/gohugoio/hugo/security/advisories/GHSA-ppf8-hhpp-f5hj\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://gohugo.io/getting-started/configuration-markup/#renderhooksimageenabledefault\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": "[{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}, {\"lang\": \"en\", \"value\": \"CWE-80\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-32875\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-04-23T21:15:48.837\",\"lastModified\":\"2024-11-21T09:15:54.960\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Hugo is a static site generator. Starting in version 0.123.0 and prior to version 0.125.3, title arguments in Markdown for links and images not escaped in internal render hooks. Hugo users who are impacted are those who have these hooks enabled and do not trust their Markdown content files. The issue is patched in v0.125.3. As a workaround, replace the templates with user defined templates or disable the internal templates.\"},{\"lang\":\"es\",\"value\":\"Hugo es un generador de sitios est\u00e1ticos. A partir de la versi\u00f3n 0.123.0 y antes de la versi\u00f3n 0.125.3, los argumentos de t\u00edtulo en Markdown para enlaces e im\u00e1genes no escaparon en ganchos de renderizado internos. Los usuarios de Hugo que se ven afectados son aquellos que tienen estos enlaces habilitados y no conf\u00edan en sus archivos de contenido de Markdown. El problema se solucion\u00f3 en v0.125.3. Como workaround, reemplace las plantillas con plantillas definidas por el usuario o desactive las plantillas internas.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"},{\"lang\":\"en\",\"value\":\"CWE-80\"}]}],\"references\":[{\"url\":\"https://github.com/gohugoio/hugo/releases/tag/v0.125.3\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/gohugoio/hugo/security/advisories/GHSA-ppf8-hhpp-f5hj\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://gohugo.io/getting-started/configuration-markup/#renderhooksimageenabledefault\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/gohugoio/hugo/releases/tag/v0.125.3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/gohugoio/hugo/security/advisories/GHSA-ppf8-hhpp-f5hj\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://gohugo.io/getting-started/configuration-markup/#renderhooksimageenabledefault\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"cna\": {\"title\": \"Hugo doesn\u0027t escape markdown title in internal render hooks\", \"problemTypes\": [{\"descriptions\": [{\"cweId\": \"CWE-80\", \"lang\": \"en\", \"description\": \"CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)\", \"type\": \"CWE\"}]}, {\"descriptions\": [{\"cweId\": \"CWE-79\", \"lang\": \"en\", \"description\": \"CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)\", \"type\": \"CWE\"}]}], \"metrics\": [{\"cvssV3_1\": {\"attackComplexity\": \"LOW\", \"attackVector\": \"NETWORK\", \"availabilityImpact\": \"NONE\", \"baseScore\": 6.1, \"baseSeverity\": \"MEDIUM\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"scope\": \"CHANGED\", \"userInteraction\": \"REQUIRED\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\", \"version\": \"3.1\"}}], \"references\": [{\"name\": \"https://github.com/gohugoio/hugo/security/advisories/GHSA-ppf8-hhpp-f5hj\", \"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://github.com/gohugoio/hugo/security/advisories/GHSA-ppf8-hhpp-f5hj\"}, {\"name\": \"https://github.com/gohugoio/hugo/releases/tag/v0.125.3\", \"tags\": [\"x_refsource_MISC\"], \"url\": \"https://github.com/gohugoio/hugo/releases/tag/v0.125.3\"}, {\"name\": \"https://gohugo.io/getting-started/configuration-markup/#renderhooksimageenabledefault\", \"tags\": [\"x_refsource_MISC\"], \"url\": \"https://gohugo.io/getting-started/configuration-markup/#renderhooksimageenabledefault\"}], \"affected\": [{\"vendor\": \"gohugoio\", \"product\": \"hugo\", \"versions\": [{\"version\": \"\u003e= 0.123.0, \u003c 0.125.3\", \"status\": \"affected\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2024-04-23T20:23:42.535Z\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Hugo is a static site generator. Starting in version 0.123.0 and prior to version 0.125.3, title arguments in Markdown for links and images not escaped in internal render hooks. Hugo users who are impacted are those who have these hooks enabled and do not trust their Markdown content files. The issue is patched in v0.125.3. As a workaround, replace the templates with user defined templates or disable the internal templates.\"}], \"source\": {\"advisory\": \"GHSA-ppf8-hhpp-f5hj\", \"discovery\": \"UNKNOWN\"}}, \"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-32875\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-04-29T19:39:12.988615Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:gohugo:hugo:0.123.0:*:*:*:*:*:*:*\"], \"vendor\": \"gohugo\", \"product\": \"hugo\", \"versions\": [{\"status\": \"affected\", \"version\": \"0.123.0\", \"lessThan\": \"0.125.3\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-04-29T19:39:07.380Z\"}}]}",
"cveMetadata": "{\"cveId\": \"CVE-2024-32875\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"GitHub_M\", \"dateReserved\": \"2024-04-19T14:07:11.229Z\", \"datePublished\": \"2024-04-23T20:23:42.535Z\", \"dateUpdated\": \"2024-06-04T17:51:21.525Z\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…