CVE-2020-35659

The DNS query log in Pi-hole before 5.2.2 is vulnerable to stored XSS. An attacker with the ability to directly or indirectly query DNS with a malicious hostname can cause arbitrary JavaScript to execute when the Pi-hole administrator visits the Query Log or Long-term data Query Log page.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pi-hole:pi-hole:*:*:*:*:*:*:*:*

History

28 Dec 2020, 17:40

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 4.3
v3 : 6.1
CPE cpe:2.3:a:pi-hole:pi-hole:*:*:*:*:*:*:*:*
CWE CWE-79
References (MISC) https://blog.mirch.io/2020/12/24/pihole-xss/ - (MISC) https://blog.mirch.io/2020/12/24/pihole-xss/ - Third Party Advisory
References (MISC) https://github.com/pi-hole/AdminLTE/pull/1665 - (MISC) https://github.com/pi-hole/AdminLTE/pull/1665 - Patch, Third Party Advisory
References (CONFIRM) https://discourse.pi-hole.net/t/pi-hole-core-web-v5-2-2-and-ftl-v5-3-3-released/41998 - (CONFIRM) https://discourse.pi-hole.net/t/pi-hole-core-web-v5-2-2-and-ftl-v5-3-3-released/41998 - Release Notes, Vendor Advisory

Information

Published : 2020-12-24 16:15

Updated : 2023-12-10 13:41


NVD link : CVE-2020-35659

Mitre link : CVE-2020-35659

CVE.ORG link : CVE-2020-35659


JSON object : View

Products Affected

pi-hole

  • pi-hole
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')