{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T19:58:43.110","vulnerabilities":[{"cve":{"id":"CVE-2023-45815","sourceIdentifier":"security-advisories@github.com","published":"2023-10-19T22:15:10.407","lastModified":"2024-11-21T08:27:24.763","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ArchiveBox is an open source self-hosted web archiving system. Any users who are using the `wget` extractor and view the content it outputs. The impact is potentially severe if you are logged in to the ArchiveBox admin site in the same browser session and view an archived malicious page designed to target your ArchiveBox instance. Malicious Javascript could potentially act using your logged-in admin credentials and add/remove/modify snapshots, add/remove/modify ArchiveBox users, and generally do anything an admin user could do. The impact is less severe for non-logged-in users, as malicious Javascript cannot *modify* any archives, but it can still *read* all the other archived content by fetching the snapshot index and iterating through it. Because all of ArchiveBox's archived content is served from the same host and port as the admin panel, when archived pages are viewed the JS executes in the same context as all the other archived pages (and the admin panel), defeating most of the browser's usual CORS/CSRF security protections and leading to this issue. A patch is being developed in https://github.com/ArchiveBox/ArchiveBox/issues/239. As a mitigation for this issue would be to disable the wget extractor by setting `archivebox config --set SAVE_WGET=False`, ensure you are always logged out, or serve only a [static HTML version](https://github.com/ArchiveBox/ArchiveBox/wiki/Publishing-Your-Archive#2-export-and-host-it-as-static-html) of your archive."},{"lang":"es","value":"ArchiveBox es un sistema de archivo web autohospedado de código abierto. Cualquier usuario que esté utilizando el extractor `wget` y vea el contenido que genera. El impacto es potencialmente grave si inicia sesión en el sitio de administración de ArchiveBox en la misma sesión del navegador y ve una página maliciosa archivada diseñada para apuntar a su instancia de ArchiveBox. Javascript malicioso podría potencialmente actuar utilizando sus credenciales de administrador iniciadas y agregar/eliminar/modificar instantáneas, agregar/eliminar/modificar usuarios de ArchiveBox y, en general, hacer cualquier cosa que un usuario administrador pueda hacer. El impacto es menos severo para los usuarios que no han iniciado sesión, ya que Javascript malicioso no puede *modificar* ningún archivo, pero aún puede *leer* todo el resto del contenido archivado al obtener el índice de la instantánea y recorrerlo en iteración. Debido a que todo el contenido archivado de ArchiveBox se sirve desde el mismo host y puerto que el panel de administración, cuando se ven las páginas archivadas, JS se ejecuta en el mismo contexto que todas las demás páginas archivadas (y el panel de administración), anulando la mayoría de las funciones habituales del navegador. Protecciones de seguridad CORS/CSRF y lo que lleva a este problema. Se está desarrollando un parche en https://github.com/ArchiveBox/ArchiveBox/issues/239. Como mitigación para este problema, sería deshabilitar el extractor de wget configurando `archivebox config --set SAVE_WGET=False`, asegurarse de estar siempre desconectado o servir solo una [versión HTML estática] (https://github.com /ArchiveBox/ArchiveBox/wiki/Publishing-Your-Archive#2-export-and-host-it-as-static-html) de su archivo."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N","baseScore":6.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":1.2,"impactScore":5.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:archivebox:archivebox:*:*:*:*:*:*:*:*","versionEndIncluding":"0.6.2","matchCriteriaId":"7E721DF1-19BE-4E74-AAD8-C2C26FB0B887"}]}]}],"references":[{"url":"https://github.com/ArchiveBox/ArchiveBox/issues/239","source":"security-advisories@github.com","tags":["Exploit","Issue Tracking"]},{"url":"https://github.com/ArchiveBox/ArchiveBox/security/advisories/GHSA-cr45-98w9-gwqx","source":"security-advisories@github.com","tags":["Patch","Vendor Advisory"]},{"url":"https://github.com/ArchiveBox/ArchiveBox/issues/239","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Issue Tracking"]},{"url":"https://github.com/ArchiveBox/ArchiveBox/security/advisories/GHSA-cr45-98w9-gwqx","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}