Описание
XSS in TinyMCE
Impact
A cross-site scripting (XSS) vulnerability was discovered in: the core parser and media plugin. The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor via the clipboard or APIs. This impacts all users who are using TinyMCE 4.9.9 or lower and TinyMCE 5.2.1 or lower.
Patches
This vulnerability has been patched in TinyMCE 4.9.10 and 5.2.2 by improved HTML parsing and sanitization logic.
Workarounds
The workarounds available are:
- disable the media plugin and manually sanitize CDATA content (see below) or
- upgrade to either TinyMCE 4.9.10 or TinyMCE 5.2.2
Example: Manually strip CDATA elements
Acknowledgements
Tiny Technologies would like to thank Michał Bentkowski and intivesec for discovering these vulnerabilities.
References
https://www.tiny.cloud/docs/release-notes/release-notes522/#securityfixes
For more information
If you have any questions or comments about this advisory:
- Open an issue in the TinyMCE repo
- Email us at infosec@tiny.cloud
Пакеты
tinymce
< 4.9.10
4.9.10
tinymce
>= 5.0.0, < 5.2.2
5.2.2
Связанные уязвимости
tinymce 4.7.11, 4.7.12 is affected by: CWE-79: Improper Neutralization of Input During Web Page Generation. The impact is: JavaScript code execution. The component is: Media element. The attack vector is: The victim must paste malicious content to media element's embed tab.
tinymce 4.7.11, 4.7.12 is affected by: CWE-79: Improper Neutralization of Input During Web Page Generation. The impact is: JavaScript code execution. The component is: Media element. The attack vector is: The victim must paste malicious content to media element's embed tab.
tinymce 4.7.11, 4.7.12 is affected by: CWE-79: Improper Neutralization ...