Impact
An attacker is able to execute arbitrary JavaScript in a victim user's CVAT UI session, provided that they are able to do at least one of the following:
-
Create a maliciously crafted label in a CVAT task or project, then get the victim user to either edit that label, or view a shape that refers to that label.
-
Get the victim user to upload a maliciously crafted SVG image when configuring a skeleton.
This gives the attacker temporary access to all CVAT resources that the victim user can access.
Patches
Upgrade CVAT to version 2.55.0 or a later version.
Workarounds
N/A
References
Fix commit: 4080070
Impact
An attacker is able to execute arbitrary JavaScript in a victim user's CVAT UI session, provided that they are able to do at least one of the following:
Create a maliciously crafted label in a CVAT task or project, then get the victim user to either edit that label, or view a shape that refers to that label.
Get the victim user to upload a maliciously crafted SVG image when configuring a skeleton.
This gives the attacker temporary access to all CVAT resources that the victim user can access.
Patches
Upgrade CVAT to version 2.55.0 or a later version.
Workarounds
N/A
References
Fix commit: 4080070