2024-08-19 14:03:15 +00:00

76 lines
3.6 KiB
JSON

{
"id": "CVE-2024-43369",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-16T02:15:16.600",
"lastModified": "2024-08-19T13:00:23.117",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Ibexa RichText Field Type is a Field Type for supporting rich formatted text stored in a structured XML format. In versions on the 4.6 branch prior to 4.6.10, the validator for the RichText fieldtype blocklists `javascript:` and `vbscript:` in links to prevent XSS. This can leave other options open, and the check can be circumvented using upper case. Content editing permissions for RichText content is required to exploit this vulnerability, which typically means Editor role or higher. The fix implements an allowlist instead, which allows only approved link protocols. The new check is case insensitive. Version 4.6.10 contains a patch for this issue. No known workarounds are available."
},
{
"lang": "es",
"value": " Ibexa RichText Field Type es un tipo de campo que admite texto enriquecido almacenado en un formato XML estructurado. En las versiones de la rama 4.6 anteriores a la 4.6.10, el validador para el tipo de campo RichText incluye listas de bloqueo `javascript:` y `vbscript:` en enlaces para evitar XSS. Esto puede dejar otras opciones abiertas y la verificaci\u00f3n se puede omitir usando may\u00fasculas. Se requieren permisos de edici\u00f3n de contenido para contenido RichText para aprovechar esta vulnerabilidad, lo que normalmente significa la funci\u00f3n de Editor o superior. En su lugar, la soluci\u00f3n implementa una lista de permitidos, que solo permite protocolos de enlace aprobados. El nuevo cheque no distingue entre may\u00fasculas y min\u00fasculas. La versi\u00f3n 4.6.10 contiene un parche para este problema. No hay soluciones conocidas disponibles."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://developers.ibexa.co/security-advisories/ibexa-sa-2024-005-persistent-xss-in-richtext",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/ezsystems/ezplatform-richtext/security/advisories/GHSA-rhm7-7469-rcpw",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/ibexa/fieldtype-richtext/commit/0a3b830e8806d5169f697351fdc48ffd95a25c67",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/ibexa/fieldtype-richtext/commit/59e9c1a9da60597f60cf7338bf289dccaa7e27ca",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/ibexa/fieldtype-richtext/security/advisories/GHSA-hvcf-6324-cjh7",
"source": "security-advisories@github.com"
}
]
}