Описание
CKAN vulnerable to stored XSS in resource description
Impact
The helpers.markdown_extract() function did not perform sufficient sanitization of input data before wrapping in an HTML literal element. This helper is used to render user-provided data on dataset, resource, organization or group pages (plus any page provided by an extension that used that helper function), leading to a potential XSS vector.
Patches
This vulnerability has been fixed in CKAN 2.10.9 and 2.11.4
Ссылки
- https://github.com/ckan/ckan/security/advisories/GHSA-2r4h-8jxv-w2j8
- https://nvd.nist.gov/vuln/detail/CVE-2025-54384
- https://github.com/ckan/ckan/commit/112affffa74b14fc97c54abcf18315df97114917
- https://github.com/ckan/ckan/commit/6d0065f2fc7e2682196d125275af34b93e9e554e
- https://github.com/ckan/ckan/releases/tag/ckan-2.10.9
- https://github.com/ckan/ckan/releases/tag/ckan-2.11.4
Пакеты
ckan
>= 2.11.0, < 2.11.4
2.11.4
ckan
< 2.10.9
2.10.9
Связанные уязвимости
CKAN is an open-source DMS (data management system) for powering data hubs and data portals. Prior to 2.10.9 and 2.11.4, the helpers.markdown_extract() function did not perform sufficient sanitization of input data before wrapping in an HTML literal element. This helper is used to render user-provided data on dataset, resource, organization or group pages (plus any page provided by an extension that used that helper function), leading to a potential XSS vector. This vulnerability has been fixed in CKAN 2.10.9 and 2.11.4.