Описание
Cross-site Scripting in django-wiki
In Django-wiki, versions 0.0.20 to 0.7.8 are vulnerable to Stored Cross-Site Scripting (XSS) in Notifications Section. An attacker who has access to edit pages can inject JavaScript payload in the title field. When a victim gets a notification regarding the changes made in the application, the payload in the notification panel renders and loads external JavaScript.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2021-25986
- https://github.com/django-wiki/django-wiki/pull/1148
- https://github.com/django-wiki/django-wiki/commit/9eaccc7519e4206a4d2f22640882f0737b2da9c5
- https://github.com/pypa/advisory-database/tree/main/vulns/wiki/PYSEC-2021-850.yaml
- https://pypi.org/project/wiki
- https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25986
Пакеты
wiki
>= 0.0.20, < 0.7.9
0.7.9
Связанные уязвимости
In Django-wiki, versions 0.0.20 to 0.7.8 are vulnerable to Stored Cross-Site Scripting (XSS) in Notifications Section. An attacker who has access to edit pages can inject JavaScript payload in the title field. When a victim gets a notification regarding the changes made in the application, the payload in the notification panel renders and loads external JavaScript.