Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rhm7-7469-rcpw

Опубликовано: 14 авг. 2024
Источник: github
Github: Прошло ревью

Описание

Persistent Cross-site Scripting in eZ Platform Rich Text Field Type

Impact

The validator for the RichText fieldtype blocklists javascript: and vbscript: in links to prevent XSS. This can leave other options open, and the check can be circumvented using upper case. Content editing permissions for RichText content is required to exploit this vulnerability, which typically means Editor role or higher. The fix implements an allowlist instead, which allows only approved link protocols. The new check is case insensitive.

Patches

Workarounds

None.

References

Credit

This vulnerability was discovered and reported to Ibexa by Alec Romano: https://github.com/4rdr We thank them for reporting it responsibly to us.

How to report security issues: https://doc.ibexa.co/en/latest/infrastructure_and_maintenance/security/reporting_issues/

Пакеты

Наименование

ezsystems/ezplatform-richtext

composer
Затронутые версииВерсия исправления

>= 3.3.0, < 3.3.40

3.3.40

Дефекты

CWE-79

Связанные уязвимости

nvd
больше 1 года назад

Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-43369. Reason: This candidate is a duplicate of CVE-2024-43369. Notes: All CVE users should reference CVE-2024-43369 instead of this candidate. This CVE was issued to a vulnerability that is dependent on CVE-2024-43369. According to rule 4.2.15 of the CVE CNA rules, "CNAs MUST NOT assign a different CVE ID to a Vulnerability that is fully interdependent with another Vulnerability. The Vulnerabilities are effectively the same single Vulnerability and MUST use one CVE ID."

Дефекты

CWE-79