CMU’s VINCE 2.0.6: When XSS Marks the Spot!
VINCE 2.0.6, a Python-based web platform by CMU CERT/CC, has a stored XSS vulnerability. Affected users might find their browser singing to the tune of some unexpected HTML/JS code. Who knew web security could be so… scriptive?

Hot Take:
Well, folks, Carnegie Mellon University’s VINCE platform is once again the star of the cybersecurity soap opera, but this time it’s not for being the hero. Instead, it’s caught in a web of its own making—an unholy tangle of stored cross-site scripting (XSS) vulnerabilities. Looks like this Python-based platform is getting a crash course in “How Not to Handle User Input 101”. Who knew that ‘content’ could be so contentious?
Key Points:
- VINCE, developed by CMU CERT/CC, is a platform for coordinating vulnerability disclosures.
- The system is susceptible to an authenticated stored XSS vulnerability through the ‘content’ parameter.
- This vulnerability allows execution of arbitrary HTML/JavaScript in a user’s browser.
- Tested on nginx/1.20.0 and Django 3.2.17, indicating a wide potential impact.
- Discovered by security researcher Gjoko ‘LiquidWorm’ Krstic, who sounds like a character from a cyberpunk novel.
Already a member? Log in here