flarum sticky 在web页面生成时对输入的转义处理不恰当(跨站脚本)

admin 2023-12-01 16:36:28 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
中危 flarum sticky 在web页面生成时对输入的转义处理不恰当(跨站脚本)

CVE编号

CVE-2021-21283

利用情况

暂无

补丁情况

官方补丁

披露时间

2021-01-27
漏洞描述
Flarum is an open source discussion platform for websites. The "Flarum Sticky" extension versions 0.1.0-beta.14 and 0.1.0-beta.15 has a cross-site scripting vulnerability. A change in release beta 14 of the Sticky extension caused the plain text content of the first post of a pinned discussion to be injected as HTML on the discussion list. The issue was discovered following an internal audit. Any HTML would be injected through the m.trust() helper. This resulted in an HTML injection where <script> tags would not be executed. However it was possible to run javascript from other HTML attributes, enabling a cross-site scripting (XSS) attack to be performed. Since the exploit only happens with the first post of a pinned discussion, an attacker would need the ability to pin their own discussion, or be able to edit a discussion that was previously pinned. On forums where all pinned posts are authored by your staff, you can be relatively certain the vulnerability has not been exploited. Forums where some user-created discussions were pinned can look at the first post edit date to find whether the vulnerability might have been exploited. Because Flarum doesn't store the post content history, you cannot be certain if a malicious edit was reverted. The fix will be available in version v0.1.0-beta.16 with Flarum beta 16. The fix has already been back-ported to Flarum beta 15 as version v0.1.0-beta.15.1 of the Sticky extension. Forum administrators can disable the Sticky extension until they are able to apply the update. The vulnerability cannot be exploited while the extension is disabled.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://discuss.flarum.org/d/26042-security-update-to-flarum-sticky-010-beta151%29
https://github.com/flarum/sticky/commit/7ebd30462bd405c4c0570b93a6d48710e6c3db19
https://github.com/flarum/sticky/pull/24
https://github.com/flarum/sticky/security/advisories/GHSA-h3gg-7wx2-cq3h
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 flarum sticky 0.1.0 -
阿里云评分 4.9
  • 攻击路径 本地
  • 攻击复杂度 困难
  • 权限要求 管控权限
  • 影响范围 有限影响
  • EXP成熟度 未验证
  • 补丁情况 官方补丁
  • 数据保密性 无影响
  • 数据完整性 无影响
  • 服务器危害 无影响
  • 全网数量 N/A
CWE-ID 漏洞类型
CWE-79 在Web页面生成时对输入的转义处理不恰当(跨站脚本)
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0