CVE-2024-55601
Vulnerability from cvelistv5
Published
2024-12-09 21:11
Modified
2024-12-10 17:13
Severity ?
EPSS score ?
Summary
Hugo is a static site generator. Starting in version 0.123.0 and prior to version 0.139.4, some HTML attributes in Markdown in the internal templates listed below not escaped in internal render hooks. Those whoa re impacted are Hugo users who do not trust their Markdown content files and are using one or more of these templates: `_default/_markup/render-link.html` from `v0.123.0`; `_default/_markup/render-image.html` from `v0.123.0`; `_default/_markup/render-table.html` from `v0.134.0`; and/or `shortcodes/youtube.html` from `v0.125.0`. This issue is patched in v0.139.4. As a workaround, one may replace an affected component with user defined templates or disable the internal templates.
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-55601", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-10T16:09:30.192956Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-10T17:13:48.519Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "hugo", "vendor": "gohugoio", "versions": [ { "status": "affected", "version": "\u003e= 0.123.0, \u003c 0.139.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Hugo is a static site generator. Starting in version 0.123.0 and prior to version 0.139.4, some HTML attributes in Markdown in the internal templates listed below not escaped in internal render hooks. Those whoa re impacted are Hugo users who do not trust their Markdown content files and are using one or more of these templates: `_default/_markup/render-link.html` from `v0.123.0`; `_default/_markup/render-image.html` from `v0.123.0`; `_default/_markup/render-table.html` from `v0.134.0`; and/or `shortcodes/youtube.html` from `v0.125.0`. This issue is patched in v0.139.4. As a workaround, one may replace an affected component with user defined templates or disable the internal templates." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 5.3, "baseSeverity": "MEDIUM", "privilegesRequired": "NONE", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "LOW", "subIntegrityImpact": "LOW", "userInteraction": "PASSIVE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-09T21:11:10.463Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/gohugoio/hugo/security/advisories/GHSA-c2xf-9v2r-r2rx", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/gohugoio/hugo/security/advisories/GHSA-c2xf-9v2r-r2rx" }, { "name": "https://github.com/gohugoio/hugo/commit/54398f8d572c689f9785d59e907fd910a23401b0", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/gohugoio/hugo/commit/54398f8d572c689f9785d59e907fd910a23401b0" }, { "name": "https://github.com/gohugoio/hugo/releases/tag/v0.139.4", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/gohugoio/hugo/releases/tag/v0.139.4" }, { "name": "https://gohugo.io/getting-started/configuration-markup/#renderhooksimageenabledefault", "tags": [ "x_refsource_MISC" ], "url": "https://gohugo.io/getting-started/configuration-markup/#renderhooksimageenabledefault" } ], "source": { "advisory": "GHSA-c2xf-9v2r-r2rx", "discovery": "UNKNOWN" }, "title": "Hugo does not escape some attributes in internal templates" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-55601", "datePublished": "2024-12-09T21:11:10.463Z", "dateReserved": "2024-12-09T14:22:52.524Z", "dateUpdated": "2024-12-10T17:13:48.519Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "descriptions": "[{\"lang\": \"en\", \"value\": \"Hugo is a static site generator. Starting in version 0.123.0 and prior to version 0.139.4, some HTML attributes in Markdown in the internal templates listed below not escaped in internal render hooks. Those whoa re impacted are Hugo users who do not trust their Markdown content files and are using one or more of these templates: `_default/_markup/render-link.html` from `v0.123.0`; `_default/_markup/render-image.html` from `v0.123.0`; `_default/_markup/render-table.html` from `v0.134.0`; and/or `shortcodes/youtube.html` from `v0.125.0`. This issue is patched in v0.139.4. As a workaround, one may replace an affected component with user defined templates or disable the internal templates.\"}, {\"lang\": \"es\", \"value\": \"Hugo es un generador de sitios est\\u00e1ticos. A partir de la versi\\u00f3n 0.123.0 y antes de la versi\\u00f3n 0.139.4, algunos atributos HTML en Markdown en las plantillas internas que se enumeran a continuaci\\u00f3n no se escapaban en los ganchos de renderizado internos. Los afectados son los usuarios de Hugo que no conf\\u00edan en sus archivos de contenido Markdown y est\\u00e1n usando una o m\\u00e1s de estas plantillas: `_default/_markup/render-link.html` de `v0.123.0`; `_default/_markup/render-image.html` de `v0.123.0`; `_default/_markup/render-table.html` de `v0.134.0`; y/o `shortcodes/youtube.html` de `v0.125.0`. Este problema se solucion\\u00f3 en la versi\\u00f3n v0.139.4. Como workaround, se puede reemplazar un componente afectado con plantillas definidas por el usuario o deshabilitar las plantillas internas.\"}]", "id": "CVE-2024-55601", "lastModified": "2024-12-09T22:15:23.100", "metrics": "{\"cvssMetricV40\": [{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"4.0\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"PASSIVE\", \"vulnerableSystemConfidentiality\": \"NONE\", \"vulnerableSystemIntegrity\": \"NONE\", \"vulnerableSystemAvailability\": \"NONE\", \"subsequentSystemConfidentiality\": \"LOW\", \"subsequentSystemIntegrity\": \"LOW\", \"subsequentSystemAvailability\": \"NONE\", \"exploitMaturity\": \"NOT_DEFINED\", \"confidentialityRequirements\": \"NOT_DEFINED\", \"integrityRequirements\": \"NOT_DEFINED\", \"availabilityRequirements\": \"NOT_DEFINED\", \"modifiedAttackVector\": \"NOT_DEFINED\", \"modifiedAttackComplexity\": \"NOT_DEFINED\", \"modifiedAttackRequirements\": \"NOT_DEFINED\", \"modifiedPrivilegesRequired\": \"NOT_DEFINED\", \"modifiedUserInteraction\": \"NOT_DEFINED\", \"modifiedVulnerableSystemConfidentiality\": \"NOT_DEFINED\", \"modifiedVulnerableSystemIntegrity\": \"NOT_DEFINED\", \"modifiedVulnerableSystemAvailability\": \"NOT_DEFINED\", \"modifiedSubsequentSystemConfidentiality\": \"NOT_DEFINED\", \"modifiedSubsequentSystemIntegrity\": \"NOT_DEFINED\", \"modifiedSubsequentSystemAvailability\": \"NOT_DEFINED\", \"safety\": \"NOT_DEFINED\", \"automatable\": \"NOT_DEFINED\", \"recovery\": \"NOT_DEFINED\", \"valueDensity\": \"NOT_DEFINED\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\", \"providerUrgency\": \"NOT_DEFINED\"}}]}", "published": "2024-12-09T22:15:23.100", "references": "[{\"url\": \"https://github.com/gohugoio/hugo/commit/54398f8d572c689f9785d59e907fd910a23401b0\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/gohugoio/hugo/releases/tag/v0.139.4\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/gohugoio/hugo/security/advisories/GHSA-c2xf-9v2r-r2rx\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://gohugo.io/getting-started/configuration-markup/#renderhooksimageenabledefault\", \"source\": \"security-advisories@github.com\"}]", "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Awaiting Analysis", "weaknesses": "[{\"source\": \"security-advisories@github.com\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2024-55601\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-12-09T22:15:23.100\",\"lastModified\":\"2024-12-09T22:15:23.100\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Hugo is a static site generator. Starting in version 0.123.0 and prior to version 0.139.4, some HTML attributes in Markdown in the internal templates listed below not escaped in internal render hooks. Those whoa re impacted are Hugo users who do not trust their Markdown content files and are using one or more of these templates: `_default/_markup/render-link.html` from `v0.123.0`; `_default/_markup/render-image.html` from `v0.123.0`; `_default/_markup/render-table.html` from `v0.134.0`; and/or `shortcodes/youtube.html` from `v0.125.0`. This issue is patched in v0.139.4. As a workaround, one may replace an affected component with user defined templates or disable the internal templates.\"},{\"lang\":\"es\",\"value\":\"Hugo es un generador de sitios est\u00e1ticos. A partir de la versi\u00f3n 0.123.0 y antes de la versi\u00f3n 0.139.4, algunos atributos HTML en Markdown en las plantillas internas que se enumeran a continuaci\u00f3n no se escapaban en los ganchos de renderizado internos. Los afectados son los usuarios de Hugo que no conf\u00edan en sus archivos de contenido Markdown y est\u00e1n usando una o m\u00e1s de estas plantillas: `_default/_markup/render-link.html` de `v0.123.0`; `_default/_markup/render-image.html` de `v0.123.0`; `_default/_markup/render-table.html` de `v0.134.0`; y/o `shortcodes/youtube.html` de `v0.125.0`. Este problema se solucion\u00f3 en la versi\u00f3n v0.139.4. Como workaround, se puede reemplazar un componente afectado con plantillas definidas por el usuario o deshabilitar las plantillas internas.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"PASSIVE\",\"vulnerableSystemConfidentiality\":\"NONE\",\"vulnerableSystemIntegrity\":\"NONE\",\"vulnerableSystemAvailability\":\"NONE\",\"subsequentSystemConfidentiality\":\"LOW\",\"subsequentSystemIntegrity\":\"LOW\",\"subsequentSystemAvailability\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirements\":\"NOT_DEFINED\",\"integrityRequirements\":\"NOT_DEFINED\",\"availabilityRequirements\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnerableSystemConfidentiality\":\"NOT_DEFINED\",\"modifiedVulnerableSystemIntegrity\":\"NOT_DEFINED\",\"modifiedVulnerableSystemAvailability\":\"NOT_DEFINED\",\"modifiedSubsequentSystemConfidentiality\":\"NOT_DEFINED\",\"modifiedSubsequentSystemIntegrity\":\"NOT_DEFINED\",\"modifiedSubsequentSystemAvailability\":\"NOT_DEFINED\",\"safety\":\"NOT_DEFINED\",\"automatable\":\"NOT_DEFINED\",\"recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"references\":[{\"url\":\"https://github.com/gohugoio/hugo/commit/54398f8d572c689f9785d59e907fd910a23401b0\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/gohugoio/hugo/releases/tag/v0.139.4\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/gohugoio/hugo/security/advisories/GHSA-c2xf-9v2r-r2rx\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://gohugo.io/getting-started/configuration-markup/#renderhooksimageenabledefault\",\"source\":\"security-advisories@github.com\"}]}}", "vulnrichment": { "containers": "{\"cna\": {\"title\": \"Hugo does not escape some attributes in internal templates\", \"problemTypes\": [{\"descriptions\": [{\"cweId\": \"CWE-79\", \"lang\": \"en\", \"description\": \"CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)\", \"type\": \"CWE\"}]}], \"metrics\": [{\"cvssV4_0\": {\"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"PASSIVE\", \"vulnConfidentialityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"NONE\", \"subConfidentialityImpact\": \"LOW\", \"subIntegrityImpact\": \"LOW\", \"subAvailabilityImpact\": \"NONE\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N\", \"version\": \"4.0\"}}], \"references\": [{\"name\": \"https://github.com/gohugoio/hugo/security/advisories/GHSA-c2xf-9v2r-r2rx\", \"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://github.com/gohugoio/hugo/security/advisories/GHSA-c2xf-9v2r-r2rx\"}, {\"name\": \"https://github.com/gohugoio/hugo/commit/54398f8d572c689f9785d59e907fd910a23401b0\", \"tags\": [\"x_refsource_MISC\"], \"url\": \"https://github.com/gohugoio/hugo/commit/54398f8d572c689f9785d59e907fd910a23401b0\"}, {\"name\": \"https://github.com/gohugoio/hugo/releases/tag/v0.139.4\", \"tags\": [\"x_refsource_MISC\"], \"url\": \"https://github.com/gohugoio/hugo/releases/tag/v0.139.4\"}, {\"name\": \"https://gohugo.io/getting-started/configuration-markup/#renderhooksimageenabledefault\", \"tags\": [\"x_refsource_MISC\"], \"url\": \"https://gohugo.io/getting-started/configuration-markup/#renderhooksimageenabledefault\"}], \"affected\": [{\"vendor\": \"gohugoio\", \"product\": \"hugo\", \"versions\": [{\"version\": \"\u003e= 0.123.0, \u003c 0.139.4\", \"status\": \"affected\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2024-12-09T21:11:10.463Z\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Hugo is a static site generator. Starting in version 0.123.0 and prior to version 0.139.4, some HTML attributes in Markdown in the internal templates listed below not escaped in internal render hooks. Those whoa re impacted are Hugo users who do not trust their Markdown content files and are using one or more of these templates: `_default/_markup/render-link.html` from `v0.123.0`; `_default/_markup/render-image.html` from `v0.123.0`; `_default/_markup/render-table.html` from `v0.134.0`; and/or `shortcodes/youtube.html` from `v0.125.0`. This issue is patched in v0.139.4. As a workaround, one may replace an affected component with user defined templates or disable the internal templates.\"}], \"source\": {\"advisory\": \"GHSA-c2xf-9v2r-r2rx\", \"discovery\": \"UNKNOWN\"}}, \"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-55601\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-12-10T16:09:30.192956Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-12-10T16:09:36.104Z\"}}]}", "cveMetadata": "{\"cveId\": \"CVE-2024-55601\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"GitHub_M\", \"dateReserved\": \"2024-12-09T14:22:52.524Z\", \"datePublished\": \"2024-12-09T21:11:10.463Z\", \"dateUpdated\": \"2024-12-10T17:13:48.519Z\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.