HSEC-2024-0001

Reflected XSS vulnerability in keter

Keter is an app-server/reverse-proxy often used with webapps build on Yesod web-framework.

In the logic handling VHost dispatch, Keter was echoing back Host header value, unescaped, as part of an HTML error page. This constitutes a reflected-XSS vulnerability. Although not readily exploitable directly from a browser (where Host header can't generally assume arbitrary values), it may become such in presence of further weaknesses in components upstream of Keter in the http proxying chain. Therefore, AC:High in CVSS evaluation.

Info

Published
February 27, 2024
Modified
February 27, 2024
CAPECs
< none >
CWEs
79
Keywords
http, xss, rxss, historical
Aliases
< none >
Related
< none >
References
[FIX] https://github.com/snoyberg/keter/pull/246

Affected

keter
CVSS
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
Versions
>=0.3.4 && <1.8.4
Declarations
Keter.Proxy.toResponse: >=0.3.4 && <1.0.1
Keter.Proxy.unknownHostResponse: >=1.0.1 && <1.8.4