2024-12-15 03:03:56 +00:00

109 lines
4.7 KiB
JSON

{
"id": "CVE-2023-46252",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-11-07T19:15:11.573",
"lastModified": "2024-11-21T08:28:10.417",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Squidex is an open source headless CMS and content management hub. Affected versions are missing origin verification in a postMessage handler which introduces a Cross-Site Scripting (XSS) vulnerability. The editor-sdk.js file defines three different class-like functions, which employ a global message event listener: SquidexSidebar, SquidexWidget, and SquidexFormField. The registered event listener takes some action based on the type of the received message. For example, when the SquidexFormField receives a message with the type valueChanged, the value property is updated. The SquidexFormField class is for example used in the editor-editorjs.html file, which can be accessed via the public wwwroot folder. It uses the onValueChanged method to register a callback function, which passes the value provided from the message event to the editor.render. Passing an attacker-controlled value to this function introduces a Cross-Site Scripting (XSS) vulnerability."
},
{
"lang": "es",
"value": "Squidex es un centro de gesti\u00f3n de contenidos y CMS headless de c\u00f3digo abierto. A las versiones afectadas les falta la verificaci\u00f3n de origen en un controlador postMessage, lo que introduce una vulnerabilidad de Cross-Site Scripting (XSS). El archivo editor-sdk.js define tres funciones similares a clases diferentes, que emplean un detector de eventos de mensajes global: SquidexSidebar, SquidexWidget y SquidexFormField. El detector de eventos registrado realiza alguna acci\u00f3n seg\u00fan el tipo de mensaje recibido. Por ejemplo, cuando SquidexFormField recibe un mensaje con el tipo valueChanged, la propiedad del valor se actualiza. La clase SquidexFormField se utiliza, por ejemplo, en el archivo editor-editorjs.html, al que se puede acceder a trav\u00e9s de la carpeta p\u00fablica wwwroot. Utiliza el m\u00e9todo onValueChanged para registrar una funci\u00f3n de devoluci\u00f3n de llamada, que pasa el valor proporcionado por el evento del mensaje al editor.render. Pasar un valor controlado por un atacante a esta funci\u00f3n introduce una vulnerabilidad de Cross-Site Scripting (XSS)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 4.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squidex.io:squidex:7.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "583031EC-994B-4E77-992B-9B2367142172"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Squidex/squidex/security/advisories/GHSA-7q4f-fprr-5jw8",
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "https://github.com/Squidex/squidex/security/advisories/GHSA-7q4f-fprr-5jw8",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}