漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
zrok has reflected XSS in GitHub OAuth callback via unsanitized refreshInterval error rendering
Vulnerability Description
zrok is software for sharing web services, files, and network resources. Prior to version 2.0.1, the proxyUi template engine uses Go's text/template (which performs no HTML escaping) instead of html/template. The GitHub OAuth callback handlers in both publicProxy and dynamicProxy embed the attacker-controlled refreshInterval query parameter verbatim into an error message when time.ParseDuration fails, and render that error unescaped into HTML. An attacker can deliver a crafted login URL to a victim; after the victim completes the GitHub OAuth flow, the callback page executes arbitrary JavaScript in the OAuth server's origin. Version 2.0.1 patches the issue.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Vulnerability Title
zrok 安全漏洞
Vulnerability Description
zrok是OpenZiti开源的一个安全的互联网共享工具。 zrok 2.0.1之前版本存在安全漏洞,该漏洞源于使用text/template模板引擎且未对refreshInterval参数进行转义,可能导致跨站脚本攻击。
CVSS Information
N/A
Vulnerability Type
N/A