mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-28 18:48:49 +00:00
18 lines
1.4 KiB
Markdown
18 lines
1.4 KiB
Markdown
|
|
### [CVE-2024-40626](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40626)
|
|||
|
|

|
|||
|
|

|
|||
|
|
&color=brighgreen)
|
|||
|
|
|
|||
|
|
### Description
|
|||
|
|
|
|||
|
|
Outline is an open source, collaborative document editor. A type confusion issue was found in ProseMirror’s rendering process that leads to a Stored Cross-Site Scripting (XSS) vulnerability in Outline. An authenticated user can create a document containing a malicious JavaScript payload. When other users view this document, the malicious Javascript can execute in the origin of Outline. Outline includes CSP rules to prevent third-party code execution, however in the case of self-hosting and having your file storage on the same domain as Outline a malicious payload can be uploaded as a file attachment and bypass those CSP restrictions. This issue has been addressed in release version 0.77.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.
|
|||
|
|
|
|||
|
|
### POC
|
|||
|
|
|
|||
|
|
#### Reference
|
|||
|
|
- https://github.com/outline/outline/security/advisories/GHSA-888c-mvg8-v6wh
|
|||
|
|
|
|||
|
|
#### Github
|
|||
|
|
No PoCs found on GitHub currently.
|
|||
|
|
|