8.2 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): REQUIRED
- Scope (S): CHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): LOW
- Availability impact (A): NONE
oRPC: Stored XSS in OpenAPI Reference Plugin via unescaped JSON.stringify
oRPC is an tool that helps build APIs that are end-to-end type-safe and adhere to OpenAPI standards. Prior to version 1.13.9, a stored cross-site scripting (XSS) vulnerability exists in the OpenAPI documentation generation of orpc. If an attacker can control any field within the OpenAPI specification (such as info.description), they can break out of the JSON context and execute arbitrary JavaScript when a user views the generated API documentation. This issue has been patched in version 1.13.9.
References
-
https://github.com/middleapi/orpc/security/advisories/GHSA-7f6v-3gx7-27q8 x_refsource_CONFIRM
-
https://github.com/middleapi/orpc/releases/tag/v1.13.9 x_refsource_MISC
Affected products
- ==< 1.13.9
Matching in nixpkgs
pkgs.protorpc
Google Protocol Protobufs RPC for Go
pkgs.haskellPackages.utxorpc
Generated code for a gRPC interface for UTxO Blockchains
pkgs.python312Packages.aiorpcx
Transport, protocol and framing-independent async RPC client and server implementation
pkgs.python312Packages.zerorpc
Easy to use, intuitive, and cross-language RPC
pkgs.python313Packages.aiorpcx
Transport, protocol and framing-independent async RPC client and server implementation
pkgs.python314Packages.aiorpcx
Transport, protocol and framing-independent async RPC client and server implementation
Package maintainers
-
@prusnak Pavol Rusnak <pavol@rusnak.io>
-
@xeji Uli Baum <xeji@cat3.de>
-
@TomaSajt TomaSajt