Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-crvm-xjhm-9h29: OctoPrint vulnerable to XSS in Action Commands Notification and Prompt

Impact

OctoPrint versions up to and including 1.11.3 are affected by a vulnerability that allows injection of arbitrary HTML and JavaScript into Action Command notification and prompt popups generated by the printer.

An attacker who successfully convinces a victim to print a specially crafted file could exploit this issue to disrupt ongoing prints, extract information (including sensitive configuration settings, if the targeted user has the necessary permissions for that), or perform other actions on behalf of the targeted user within the OctoPrint instance.

Patches

The vulnerability will be patched in version 1.11.4.

Workaround

OctoPrint administrators can mitigate the risk by disabling popups:

  • for Action Command notifications, uncheck OctoPrint Settings -> Printer Notifications -> Enable popups
  • for Action Command prompts, set OctoPrint Settings -> Printer Dialogs -> Enable support -> Never

It is also strongly recommended to ensure that files being printed originate from trusted sources, and, whenever possible, are sliced with your own slicer.

Credits

This vulnerability was discovered and responsibly disclosed to OctoPrint by Jacopo Tediosi.

ghsa
#xss#vulnerability#ios#git#java

Impact

OctoPrint versions up to and including 1.11.3 are affected by a vulnerability that allows injection of arbitrary HTML and JavaScript into Action Command notification and prompt popups generated by the printer.

An attacker who successfully convinces a victim to print a specially crafted file could exploit this issue to disrupt ongoing prints, extract information (including sensitive configuration settings, if the targeted user has the necessary permissions for that), or perform other actions on behalf of the targeted user within the OctoPrint instance.

Patches

The vulnerability will be patched in version 1.11.4.

Workaround

OctoPrint administrators can mitigate the risk by disabling popups:

  • for Action Command notifications, uncheck OctoPrint Settings -> Printer Notifications -> Enable popups
  • for Action Command prompts, set OctoPrint Settings -> Printer Dialogs -> Enable support -> Never

It is also strongly recommended to ensure that files being printed originate from trusted sources, and, whenever possible, are sliced with your own slicer.

Credits

This vulnerability was discovered and responsibly disclosed to OctoPrint by Jacopo Tediosi.

References

  • GHSA-crvm-xjhm-9h29
  • OctoPrint/OctoPrint@9112e07

ghsa: Latest News

GHSA-5pmx-7r6r-wfqq: Kgateway transformation policy template can emit files from the container