cve/2023/CVE-2023-26486.md

18 lines
1.2 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-26486](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26486)
![](https://img.shields.io/static/v1?label=Product&message=vega&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%205.13.1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen)
### Description
Vega is a visualization grammar, a declarative format for creating, saving, and sharing interactive visualization designs. The Vega `scale` expression function has the ability to call arbitrary functions with a single controlled argument. The scale expression function passes a user supplied argument group to getScale, which is then used as if it were an internal context. The context.scales[name].value is accessed from group and called as a function back in scale. This can be exploited to escape the Vega expression sandbox in order to execute arbitrary JavaScript. This issue has been fixed in version 5.13.1.
### POC
#### Reference
- https://github.com/vega/vega/security/advisories/GHSA-4vq7-882g-wcg4
#### Github
No PoCs found on GitHub currently.