In PrivateBin versions 1.2.0 before 1.2.2, and 1.3.0 before 1.3.2, a persistent XSS attack is possible. Under certain conditions, a user provided attachment file name can inject HTML leading to a persistent Cross-site scripting (XSS) vulnerability. The vulnerability has been fixed in PrivateBin v1.3.2 & v1.2.2. Admins are urged to upgrade to these versions to protect the affected users.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/PrivateBin/PrivateBin/security/advisories/GHSA-8j72-p2wm-6738 | Exploit Third Party Advisory | 
| https://privatebin.info/news/v1.3.2-v1.2.2-release.html | Release Notes Vendor Advisory | 
| https://github.com/PrivateBin/PrivateBin/issues/554 | Third Party Advisory | 
| https://github.com/PrivateBin/PrivateBin/commit/8d0ac336d23cd8c98e71d5f21cdadcae9c8a26e6 | Patch | 
Configurations
                    Configuration 1 (hide)
                                
                                
  | 
                        
Information
                Published : 2020-01-22 18:15
Updated : 2020-01-29 08:20
NVD link : CVE-2020-5223
Mitre link : CVE-2020-5223
JSON object : View
CWE
                
                    
                        
                        CWE-79
                        
            Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
                privatebin
- privatebin
 


