Описание
Cross-Site Scripting in keystone
Versions of keystone prior to 4.0.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize user input on the Contact Us page, allowing attackers to submit contact forms with malicious JavaScript in the message field. The output is not properly encoded leading an admin that opens new inquiry to execute the arbitrary JavaScript supplied in their browser.
Recommendation
Update to version 4.0.0 or later.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2017-15878
- https://github.com/keystonejs/keystone/pull/4478
- https://github.com/advisories/GHSA-7qcx-jmrc-h2rr
- https://packetstormsecurity.com/files/144756/KeystoneJS-4.0.0-beta.5-Unauthenticated-Stored-Cross-Site-Scripting.html
- https://securelayer7.net/download/pdf/KeystoneJS-Pentest-Report-SecureLayer7.pdf
- https://www.exploit-db.com/exploits/43054
- https://www.npmjs.com/advisories/980
- http://blog.securelayer7.net/keystonejs-open-source-penetration-testing-report
- http://www.securityfocus.com/bid/101541
Пакеты
Наименование
keystone
npm
Затронутые версииВерсия исправления
< 4.0.0
4.0.0
Связанные уязвимости
CVSS3: 6.1
nvd
больше 8 лет назад
A cross-site scripting (XSS) vulnerability exists in fields/types/markdown/MarkdownType.js in KeystoneJS before 4.0.0-beta.7 via the Contact Us feature.