Описание
A vulnerability in the HTML editor of Slab Quill 4.8.0 allows an attacker to execute arbitrary JavaScript by storing an XSS payload (a crafted onloadstart attribute of an IMG element) in a text field. Note: Researchers have claimed that this issue is not within the product itself, but is intended behavior in a web browser
Ссылки
- ExploitThird Party Advisory
- Broken LinkIssue TrackingThird Party Advisory
- ExploitIssue TrackingThird Party Advisory
- Product
- ExploitThird Party Advisory
- Broken LinkIssue TrackingThird Party Advisory
- ExploitIssue TrackingThird Party Advisory
- Product
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:slab:quill:4.8.0:*:*:*:*:node.js:*:*
EPSS
Процентиль: 65%
0.00496
Низкий
6.1 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-79
Связанные уязвимости
EPSS
Процентиль: 65%
0.00496
Низкий
6.1 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-79