PYSEC-2023-50
Vulnerability from pysec - Published: 2023-03-16 21:15 - Updated: 2023-05-04 03:49
VLAI?
Details
Streamlit, software for turning data scripts into web applications, had a cross-site scripting (XSS) vulnerability in versions 0.63.0 through 0.80.0. Users of hosted Streamlit app(s) were vulnerable to a reflected XSS vulnerability. An attacker could craft a malicious URL with Javascript payloads to a Streamlit app. The attacker could then trick the user into visiting the malicious URL and, if successful, the server would render the malicious javascript payload as-is, leading to XSS. Version 0.81.0 contains a patch for this vulnerability.
Impacted products
| Name | purl | streamlit | pkg:pypi/streamlit |
|---|
Aliases
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "streamlit",
"purl": "pkg:pypi/streamlit"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "afcf880c60e5d7538936cc2d9721b9e1bc02b075"
}
],
"repo": "https://github.com/streamlit/streamlit",
"type": "GIT"
},
{
"events": [
{
"introduced": "0.63.0"
},
{
"fixed": "0.81.0"
}
],
"type": "ECOSYSTEM"
}
],
"versions": [
"0.63.0",
"0.63.1",
"0.64.0",
"0.65.0",
"0.65.1",
"0.65.2",
"0.66.0",
"0.67.0",
"0.67.1",
"0.68.0",
"0.68.1",
"0.69.0",
"0.69.1",
"0.69.2",
"0.70.0",
"0.71.0",
"0.72.0",
"0.73.0",
"0.73.1",
"0.74.0",
"0.74.1",
"0.75.0",
"0.76.0",
"0.77.0",
"0.78.0",
"0.79.0",
"0.80.0"
]
}
],
"aliases": [
"CVE-2023-27494",
"GHSA-9c6g-qpgj-rvxw"
],
"details": "Streamlit, software for turning data scripts into web applications, had a cross-site scripting (XSS) vulnerability in versions 0.63.0 through 0.80.0. Users of hosted Streamlit app(s) were vulnerable to a reflected XSS vulnerability. An attacker could craft a malicious URL with Javascript payloads to a Streamlit app. The attacker could then trick the user into visiting the malicious URL and, if successful, the server would render the malicious javascript payload as-is, leading to XSS. Version 0.81.0 contains a patch for this vulnerability.",
"id": "PYSEC-2023-50",
"modified": "2023-05-04T03:49:48.326940Z",
"published": "2023-03-16T21:15:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/streamlit/streamlit/security/advisories/GHSA-9c6g-qpgj-rvxw"
},
{
"type": "FIX",
"url": "https://github.com/streamlit/streamlit/commit/afcf880c60e5d7538936cc2d9721b9e1bc02b075"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…