Описание
Decidim Cross-site Scripting vulnerability in the processes filter
Impact
The processes filter feature is susceptible to Cross-site scripting. This allows a remote attacker to execute JavaScript code in the context of a currently logged-in user. An attacker could use this vulnerability to make other users endorse or support proposals they have no intention of supporting or endorsing.
Patches
Ссылки
- https://github.com/decidim/decidim/security/advisories/GHSA-5652-92r9-3fx9
- https://nvd.nist.gov/vuln/detail/CVE-2023-34089
- https://github.com/decidim/decidim/releases/tag/v0.26.6
- https://github.com/decidim/decidim/releases/tag/v0.26.7
- https://github.com/decidim/decidim/releases/tag/v0.27.3
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/decidim-core/CVE-2023-34089.yml
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/decidim/CVE-2023-34089.yml
Пакеты
decidim
>= 0.14.0, < 0.26.7
0.26.7
decidim
>= 0.27.0, < 0.27.3
0.27.3
decidim-core
>= 0.14.0, < 0.26.7
0.26.7
decidim-core
>= 0.27.0, < 0.27.3
0.27.3
Связанные уязвимости
Decidim is a participatory democracy framework, written in Ruby on Rails, originally developed for the Barcelona City government online and offline participation website. The processes filter feature is susceptible to Cross-site scripting. This allows a remote attacker to execute JavaScript code in the context of a currently logged-in user. An attacker could use this vulnerability to make other users endorse or support proposals they have no intention of supporting or endorsing. The problem was patched in version 0.27.3 and 0.26.7.