Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hvcf-6324-cjh7

Опубликовано: 14 авг. 2024
Источник: github
Github: Прошло ревью
CVSS3: 7.2

Описание

Persistent Cross-site Scripting in Ibexa RichText Field Type

Impact

The validator for the RichText fieldtype blocklists javascript: and vbscript: in links to prevent XSS. This can leave other options open, and the check can be circumvented using upper case. Content editing permissions for RichText content is required to exploit this vulnerability, which typically means Editor role or higher. The fix implements an allowlist instead, which allows only approved link protocols. The new check is case insensitive.

Patches

Workarounds

None.

References

Credit

This vulnerability was discovered and reported to Ibexa by Alec Romano: https://github.com/4rdr We thank them for reporting it responsibly to us.

How to report security issues: https://doc.ibexa.co/en/latest/infrastructure_and_maintenance/security/reporting_issues/

Пакеты

Наименование

ibexa/fieldtype-richtext

composer
Затронутые версииВерсия исправления

>= 4.6.0, < 4.6.10

4.6.10

EPSS

Процентиль: 39%
0.00177
Низкий

7.2 High

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 7.2
nvd
больше 1 года назад

Ibexa RichText Field Type is a Field Type for supporting rich formatted text stored in a structured XML format. In versions on the 4.6 branch prior to 4.6.10, the validator for the RichText fieldtype blocklists `javascript:` and `vbscript:` in links to prevent XSS. This can leave other options open, and the check can be circumvented using upper case. Content editing permissions for RichText content is required to exploit this vulnerability, which typically means Editor role or higher. The fix implements an allowlist instead, which allows only approved link protocols. The new check is case insensitive. Version 4.6.10 contains a patch for this issue. No known workarounds are available.

EPSS

Процентиль: 39%
0.00177
Низкий

7.2 High

CVSS3

Дефекты

CWE-79