cve/2023/CVE-2023-49781.md

18 lines
1.2 KiB
Markdown
Raw Normal View History

2024-06-09 00:33:16 +00:00
### [CVE-2023-49781](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49781)
![](https://img.shields.io/static/v1?label=Product&message=nocodb&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%200.202.9%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen)
### Description
NocoDB is software for building databases as spreadsheets. Prior to 0.202.9, a stored cross-site scripting vulnerability exists within the Formula virtual cell comments functionality. The nc-gui/components/virtual-cell/Formula.vue displays a v-html tag with the value of "urls" whose contents are processed by the function replaceUrlsWithLink(). This function recognizes the pattern URI::(XXX) and creates a hyperlink tag <a> with href=XXX. However, it leaves all the other contents outside of the pattern URI::(XXX) unchanged. This vulnerability is fixed in 0.202.9.
### POC
#### Reference
- https://github.com/nocodb/nocodb/security/advisories/GHSA-h6r4-xvw6-jc5h
#### Github
No PoCs found on GitHub currently.