THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-39899

PrivateBin allows shortening of URLs for other domains

AssignerGitHub_M
Reserved2024-07-02
Published2024-07-09
Updated2024-07-10

Description

PrivateBin is an online pastebin where the server has zero knowledge of pasted data. In v1.5, PrivateBin introduced the YOURLS server-side proxy. The idea was to allow using the YOURLs URL shortener without running the YOURLs instance without authentication and/or exposing the authentication token to the public, allowing anyone to shorten any URL. With the proxy mechanism, anyone can shorten any URL pointing to the configured PrivateBin instance. The vulnerability allowed other URLs to be shortened, as long as they contain the PrivateBin instance, defeating the limit imposed by the proxy. This vulnerability is fixed in 1.7.4.



MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-305: Authentication Bypass by Primary Weakness

CWE-791: Incomplete Filtering of Special Elements

Product status

>= 1.5.0, < 1.7.4
affected

References

https://github.com/PrivateBin/PrivateBin/security/advisories/GHSA-mqqj-fx8h-437j

https://github.com/PrivateBin/PrivateBin/pull/1370

https://github.com/PrivateBin/PrivateBin/commit/0c4e810e6728f67d678458838d8430dfba4fcca4

cve.org CVE-2024-39899

nvd.nist.gov CVE-2024-39899

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-39899
© Copyright 2024 THREATINT. Made in Cyprus with +