{ "id": "CVE-2021-29434", "sourceIdentifier": "security-advisories@github.com", "published": "2021-04-19T19:15:17.610", "lastModified": "2021-04-29T14:24:41.607", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Wagtail is a Django content management system. In affected versions of Wagtail, when saving the contents of a rich text field in the admin interface, Wagtail does not apply server-side checks to ensure that link URLs use a valid protocol. A malicious user with access to the admin interface could thus craft a POST request to publish content with `javascript:` URLs containing arbitrary code. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin. See referenced GitHub advisory for additional details, including a workaround. Patched versions have been released as Wagtail 2.11.7 (for the LTS 2.11 branch) and Wagtail 2.12.4 (for the current 2.12 branch)." }, { "lang": "es", "value": "Wagtail es un sistema de gesti\u00f3n de contenido de Django. En las versiones afectadas de Wagtail, al guardar el contenido de un campo de texto enriquecido en la interfaz de administraci\u00f3n, Wagtail no aplica comprobaciones del lado del servidor para garantizar a las URL de los enlaces usar un protocolo v\u00e1lido. Un usuario malicioso con acceso a la interfaz de administraci\u00f3n podr\u00eda entonces dise\u00f1ar una petici\u00f3n POST para publicar contenido con URLs \"javascript:\" que contengan c\u00f3digo arbitrario. La vulnerabilidad no es explotable por un visitante ordinario del sitio sin acceso al administrador de Wagtail. V\u00e9ase el aviso de GitHub al que se hace referencia para obtener detalles adicionales, incluyendo una soluci\u00f3n alternativa. Las versiones parcheadas ha sido lanzadas como Wagtail versi\u00f3n 2.11.7 (para la rama LTS 2.11) y Wagtail versi\u00f3n 2.12.4 (para la rama 2.12 actual)" } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 1.7, "impactScore": 2.7 }, { "source": "security-advisories@github.com", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 0.9, "impactScore": 5.2 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE", "baseScore": 3.5 }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } ] }, "weaknesses": [ { "source": "security-advisories@github.com", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-79" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:torchbox:wagtail:*:*:*:*:-:*:*:*", "versionEndExcluding": "2.11.6", "matchCriteriaId": "D49567BA-C5CC-43C3-AF42-EA0C310D579C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:torchbox:wagtail:*:*:*:*:lts:*:*:*", "versionStartIncluding": "2.11.0", "versionEndExcluding": "2.11.7", "matchCriteriaId": "12C5EC90-1517-407D-8FD2-48EC03048565" }, { "vulnerable": true, "criteria": "cpe:2.3:a:torchbox:wagtail:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.12.0", "versionEndExcluding": "2.12.4", "matchCriteriaId": "4EB39BD7-9D15-4076-BB7B-41183023FA60" } ] } ] } ], "references": [ { "url": "https://github.com/wagtail/wagtail/security/advisories/GHSA-wq5h-f9p5-q7fx", "source": "security-advisories@github.com", "tags": [ "Mitigation", "Third Party Advisory" ] }, { "url": "https://pypi.org/project/wagtail/", "source": "security-advisories@github.com", "tags": [ "Product", "Third Party Advisory" ] } ] }