Stored XSS on Archery before 1.3

Overview :
In Archery before 1.3, inserting an XSS payload into a project name (either by creating a new project or editing an existing one) will result in stored XSS on the vulnerability-scan scheduling page.
Affected Product(s) :
  • Archery before 1.3
Vulnerability Details :
CVE ID : CVE-2019-20008
Upon a security analysis of the platform, a stored cross site scripting vulnerability was identified on the Web and Infrastructure Scan Scheduler’s project dropdown selection.

The payload is present on the project name attribute, but it is only executed upon javascript interaction by the Select2 library utilized on that specific menu. Upon deletion of the archerysec/static/js/select2.min.js file, the vulnerability was not present anymore (as were the library functionalities).

The vulnerability is not present on the python interactions, it is the live search function from select2 that evaluates and (possibly) decodes HTML Entities from the payload.

Solution :

Upgrade to the fixed version.

Common Vulnerabilityies and Exposures

Contact us to get started

CVE-2025-23208 : ZOT UP TO 2.1.1 API SETUSERGROUPS PRIVILEGES MANAGEMENT

CVE-2025-23208 : ZOT UP TO 2.1.1 API SETUSERGROUPS PRIVILEGES MANAGEMENT

Description zot is a production-ready vendor-neutral OCI image registry. The group data stored for users in the boltdb database (meta.db)

CVE-2024-12867 : ARCTIC SECURITY ARCTIC HUB UP TO 5.5.1872 CONFIGURATION SERVER-SIDE REQUEST FORGERY

CVE-2024-12867 : ARCTIC SECURITY ARCTIC HUB UP TO 5.5.1872 CONFIGURATION SERVER-SIDE REQUEST FORGERY

Description Server-Side Request Forgery in URL Mapper in Arctic Security’s Arctic Hub versions 3.0.1764-5.6.1877 allows an unauthenticated remote attacker to

CVE-2024-12840 : RED HAT SATELLITE HTTP PROXY SERVER-SIDE REQUEST FORGERY

CVE-2024-12840 : RED HAT SATELLITE HTTP PROXY SERVER-SIDE REQUEST FORGERY

Description A server-side request forgery exists in Satellite. When a PUT HTTP request is made to /http_proxies/test_connection, when supplied with