PyPi: Pretix

CVE-2024-8113

Safety vulnerability ID: 72971

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Aug 23, 2024 Updated at Nov 27, 2024
Scan your Python projects for vulnerabilities →

Advisory

Stored XSS vulnerabilities in the organizer and event settings of Pretix affected versions allowed malicious event organizers to inject HTML tags into email previews on the settings page. The fix introduced proper escaping of placeholders and dynamic content using Django's `escape` function, mitigating the risk of Cross-Site Scripting (XSS) attacks. While the default Content Security Policy (CSP) of Pretix prevents the execution of attacker-provided scripts, making exploitation unlikely, this vulnerability could still be dangerous if combined with a CSP bypass, potentially allowing impersonation of other organizers or staff users.

Affected package

pretix

Latest version: 2024.11.0

Reinventing presales, one ticket at a time

Affected versions

Fixed versions

Vulnerability changelog

This vulnerability has no description

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

MEDIUM 5.4

CVSS v3 Details

MEDIUM 5.4
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
LOW
User Interaction (UI)
REQUIRED
Scope (S)
CHANGED
Confidentiality Impact (C)
LOW
Integrity Impact (I)
LOW
Availability Availability (A)
NONE