Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 904991 (CVE-2023-27591, CVE-2023-27592) - <www-apps/miniflux-2.0.43: multiple vulnerabilities
Summary: <www-apps/miniflux-2.0.43: multiple vulnerabilities
Alias: CVE-2023-27591, CVE-2023-27592
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
Whiteboard: B4 [glsa?]
Depends on:
Reported: 2023-04-25 01:02 UTC by John Helmert III
Modified: 2023-05-01 03:42 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-04-25 01:02:40 UTC
CVE-2023-27591 (

Miniflux is a feed reader. Prior to version 2.0.43, an unauthenticated user can retrieve Prometheus metrics from a publicly reachable Miniflux instance where the `METRICS_COLLECTOR` configuration option is enabled and `METRICS_ALLOWED_NETWORKS` is set to `` (the default). A patch is available in Miniflux 2.0.43. As a workaround, set `METRICS_COLLECTOR` to `false` (default) or run Miniflux behind a trusted reverse-proxy.

CVE-2023-27592 (

Miniflux is a feed reader. Since v2.0.25, Miniflux will automatically proxy images served over HTTP to prevent mixed content errors. When an outbound request made by the Go HTTP client fails, the `html.ServerError` is returned unescaped without the expected Content Security Policy header added to valid responses. By creating an RSS feed item with the inline description containing an `<img>` tag with a `srcset` attribute pointing to an invalid URL like `http:a<script>alert(1)</script>`, we can coerce the proxy handler into an error condition where the invalid URL is returned unescaped and in full. This results in JavaScript execution on the Miniflux instance as soon as the user is convinced (e.g. by a message in the alt text) to open the broken image. An attacker can execute arbitrary JavaScript in the context of a victim Miniflux user when they open a broken image in a crafted RSS feed. This can be used to perform actions on the Miniflux instance as that user and gain administrative access to the Miniflux instance if it is reachable and the victim is an administrator. A patch is available in version 2.0.43. As a workaround sisable image proxy; default value is `http-only`.

Please stabilize >2.0.43.
Comment 1 Larry the Git Cow gentoo-dev 2023-04-25 01:55:34 UTC
The bug has been referenced in the following commit(s):

commit 4052a8ae850f98fcd9f0358e695d776066350e78
Author:     Kenton Groombridge <>
AuthorDate: 2023-04-25 01:54:08 +0000
Commit:     Kenton Groombridge <>
CommitDate: 2023-04-25 01:54:13 +0000

    www-apps/miniflux: drop 2.0.41-r1, 2.0.42-r1
    Signed-off-by: Kenton Groombridge <>

 www-apps/miniflux/Manifest                  |  4 --
 www-apps/miniflux/miniflux-2.0.41-r1.ebuild | 99 -----------------------------
 www-apps/miniflux/miniflux-2.0.42-r1.ebuild | 99 -----------------------------
 3 files changed, 202 deletions(-)
Comment 2 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-05-01 03:42:45 UTC