Описание
Cross-Site Scripting in keystone
Versions of keystone prior to 4.0.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to properly encode rendered HTML on admin-created blog posts. This allows attackers to execute arbitrary JavaScript in the victim's browser. Exploiting this vulnerability requires having access to an admin account.
Recommendation
Update to version 4.0.0 or later.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2017-15881
- https://github.com/keystonejs/keystone/issues/4437
- https://github.com/keystonejs/keystone/pull/4478
- https://github.com/advisories/GHSA-7cv6-gvx3-m54m
- https://securelayer7.net/download/pdf/KeystoneJS-Pentest-Report-SecureLayer7.pdf
- https://www.npmjs.com/advisories/981
- http://blog.securelayer7.net/keystonejs-open-source-penetration-testing-report
- http://www.securityfocus.com/bid/101541
Пакеты
Наименование
keystone
npm
Затронутые версииВерсия исправления
<= 4.0.0-beta6
4.0.0-beta7
Связанные уязвимости
CVSS3: 4.8
nvd
больше 8 лет назад
Cross-Site Scripting vulnerability in KeystoneJS before 4.0.0-beta.7 allows remote authenticated administrators to inject arbitrary web script or HTML via the "content brief" or "content extended" field, a different vulnerability than CVE-2017-15878.