Source: fava X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security
Hi, The following vulnerabilities were published for fava. CVE-2022-2514[0]: | The time and filter parameters in Fava prior to v1.22 are vulnerable | to reflected XSS due to the lack of escaping of error messages which | contained the parameters in verbatim. https://huntr.dev/bounties/dbf77139-4384-4dc5-9994-45a5e0747429 https://github.com/beancount/fava/commit/ca9e3882c7b5fbf5273ba52340b9fea6a99f3711 (v1.22) CVE-2022-2523[1]: | Cross-site Scripting (XSS) - Reflected in GitHub repository | beancount/fava prior to 1.22.2. https://huntr.dev/bounties/2a1802d8-1c2e-4919-96a7-d4dcf7ffcf8f https://github.com/beancount/fava/commit/dccfb6a2f4567f35ce2e9a78e24f92ebf946bc9b (v1.22.2) CVE-2022-2589[2]: | Cross-site Scripting (XSS) - Reflected in GitHub repository | beancount/fava prior to 1.22.3. https://huntr.dev/bounties/8705800d-cf2f-433d-9c3e-dbef6a3f7e08/ https://github.com/beancount/fava/commit/68bbb6e39319deb35ab9f18d0b6aa9fa70472539 (v1.22.3) If you fix the vulnerabilities please also make sure to include the CVE (Common Vulnerabilities & Exposures) ids in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2022-2514 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2514 [1] https://security-tracker.debian.org/tracker/CVE-2022-2523 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2523 [2] https://security-tracker.debian.org/tracker/CVE-2022-2589 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2589 Please adjust the affected versions in the BTS as needed.