Bug 1216204 (CVE-2023-5564)

Summary: VUL-0: CVE-2023-5564: froxlor: HTML injection Leads to Open redirection
Product: [openSUSE] openSUSE Distribution Reporter: SMASH SMASH <smash_bz>
Component: SecurityAssignee: Security Team bot <security-team>
Status: RESOLVED WONTFIX QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: mlin+factory, mlin, rfrohl, stoyan.manolov, wolfgang.engel
Version: Leap 15.6   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/381764/
Whiteboard:
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---
Bug Depends on:    
Bug Blocks: 1216266    

Description SMASH SMASH 2023-10-13 07:46:20 UTC
Cross-site Scripting (XSS) - Stored in GitHub repository froxlor/froxlor prior
to 2.1.0-dev1.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5564
https://huntr.dev/bounties/9254d8f3-a847-4ae8-8477-d2ce027cff5c/
https://github.com/froxlor/froxlor/commit/e8ed43056c1665522a586e3485da67f2bdf073aa
Comment 1 Robert Frohl 2023-10-13 08:52:06 UTC
might be relevant for Backports, the version is quite old though. Not easy to very.

Maybe worth to drop froxlor from Backports for 15.6 as there are quite a few CVEs and no active maintainer anymore ?
Comment 2 Max Lin 2023-10-19 06:55:49 UTC
it has been deleted in openSUSE:Backports:SLE-15-SP6 via https://build.opensuse.org/request/show/1103489 , we should not ship it anymore in Leap 15.6.