Vulnerability Description
Gotify server is a simple server for sending and receiving messages in real-time per WebSocket. Versions prior to 2.2.2 contain an XSS vulnerability that allows authenticated users to upload .html files. An attacker could execute client side scripts **if** another user opened a link. The attacker could potentially take over the account of the user that clicked the link. The Gotify UI won't natively expose such a malicious link, so an attacker has to get the user to open the malicious link in a context outside of Gotify. The vulnerability has been fixed in version 2.2.2. As a workaround, you can block access to non image files via a reverse proxy in the `./image` directory.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gotify | Server | < 2.2.2 |
Related Weaknesses (CWE)
References
- https://github.com/gotify/server/pull/534PatchThird Party Advisory
- https://github.com/gotify/server/pull/535Third Party Advisory
- https://github.com/gotify/server/security/advisories/GHSA-xv6x-456v-24xhThird Party Advisory
- https://github.com/gotify/server/pull/534PatchThird Party Advisory
- https://github.com/gotify/server/pull/535Third Party Advisory
- https://github.com/gotify/server/security/advisories/GHSA-xv6x-456v-24xhThird Party Advisory
FAQ
What is CVE-2022-46181?
CVE-2022-46181 is a vulnerability with a CVSS score of 6.1 (MEDIUM). Gotify server is a simple server for sending and receiving messages in real-time per WebSocket. Versions prior to 2.2.2 contain an XSS vulnerability that allows authenticated users to upload .html fil...
How severe is CVE-2022-46181?
CVE-2022-46181 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-46181?
Check the references section above for vendor advisories and patch information. Affected products include: Gotify Server.