Описание
Versions of the package quill-mention before 4.0.0 are vulnerable to Cross-site Scripting (XSS) due to improper user-input sanitization, via the renderList function.
Note:
If the mentions list is sourced from unsafe (user-sourced) data, this might allow an injection attack when a Quill user hits @.
Ссылки
- Exploit
- Broken Link
- Patch
- ExploitIssue Tracking
- Issue TrackingPatch
- Third Party Advisory
- Exploit
- Broken Link
- Patch
- ExploitIssue Tracking
- Issue TrackingPatch
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 4.0.0 (исключая)
cpe:2.3:a:quill-mention:quill_mention:*:*:*:*:*:node.js:*:*
EPSS
Процентиль: 79%
0.01237
Низкий
6.1 Medium
CVSS3
Дефекты
CWE-79
CWE-79
Связанные уязвимости
CVSS3: 6.1
github
больше 2 лет назад
quill-mention Cross-site Scripting vulnerability
EPSS
Процентиль: 79%
0.01237
Низкий
6.1 Medium
CVSS3
Дефекты
CWE-79
CWE-79