Описание
Decidim Cross-site Scripting vulnerability in the external link redirections
Impact
The external link feature is susceptible to Cross-site scripting. This allows a remote attacker to execute JavaScript code in the context of a currently logged-in user. An attacker could use this vulnerability to make other users endorse or support proposals they have no intention of supporting or endorsing.
Patches
Ссылки
- https://github.com/decidim/decidim/security/advisories/GHSA-469h-mqg8-535r
- https://nvd.nist.gov/vuln/detail/CVE-2023-32693
- https://github.com/decidim/decidim/releases/tag/v0.26.7
- https://github.com/decidim/decidim/releases/tag/v0.27.3
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/decidim-core/CVE-2023-32693.yml
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/decidim/CVE-2023-32693.yml
Пакеты
decidim
>= 0.25.0, < 0.26.7
0.26.7
decidim-core
>= 0.27.0, < 0.27.3
0.27.3
decidim-core
>= 0.25.0, < 0.26.7
0.26.7
decidim
>= 0.27.0, < 0.27.3
0.27.3
Связанные уязвимости
Decidim is a participatory democracy framework, written in Ruby on Rails, originally developed for the Barcelona City government online and offline participation website. The external link feature is susceptible to cross-site scripting. This allows a remote attacker to execute JavaScript code in the context of a currently logged-in user. An attacker could use this vulnerability to make other users endorse or support proposals they have no intention of supporting or endorsing. The problem was patched in versions 0.27.3 and 0.26.7.