CVE-2022-1231

NameCVE-2022-1231
DescriptionXSS via Embedded SVG in SVG Diagram Format in GitHub repository plantuml/plantuml prior to 1.2022.4. Stored XSS in the context of the diagram embedder. Depending on the actual context, this ranges from stealing secrets to account hijacking or even to code execution for example in desktop applications. Web based applications are the ones most affected. Since the SVG format allows clickable links in diagrams, it is commonly used in plugins for web based projects (like the Confluence plugin, etc. see https://plantuml.com/de/running).
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1039989

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
plantuml (PTS)buster1:1.2018.13+ds-1vulnerable
bullseye1:1.2020.2+ds-1vulnerable
bookworm1:1.2020.2+ds-3vulnerable
sid, trixie1:1.2020.2+ds-4vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
plantumlsource(unstable)(unfixed)1039989

Notes

[bookworm] - plantuml <no-dsa> (Minor issue)
[bullseye] - plantuml <no-dsa> (Minor issue)
[buster] - plantuml <no-dsa> (Minor issue)
https://huntr.dev/bounties/27db9509-6cd3-4148-8d70-5942f3837604/
https://github.com/plantuml/plantuml/commit/c9137be051ce98b3e3e27f65f54ec7d9f8886903 (v1.2022.4)

Search for package or bug name: Reporting problems