CVE-2024-43369

Aug. 16, 2024, 2:15 a.m.

Received
CVE has been recently published to the CVE List and has been received by the NVD.

Products

Ibexa Platform

  • 4.6.0 - 4.6.9

Source

security-advisories@github.com

Tags

CVE-2024-43369 details

Published : Aug. 16, 2024, 2:15 a.m.
Last Modified : Aug. 16, 2024, 2:15 a.m.

Description

Ibexa RichText Field Type is a Field Type for supporting rich formatted text stored in a structured XML format. In versions on the 4.6 branch prior to 4.6.10, the validator for the RichText fieldtype blocklists `javascript:` and `vbscript:` in links to prevent XSS. This can leave other options open, and the check can be circumvented using upper case. Content editing permissions for RichText content is required to exploit this vulnerability, which typically means Editor role or higher. The fix implements an allowlist instead, which allows only approved link protocols. The new check is case insensitive. Version 4.6.10 contains a patch for this issue. No known workarounds are available.

CVSS Score

1 2 3 4 5 6 7.2 8 9 10

Weakness

Weakness Name Description
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.

CVSS Data

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

Base Score

7.2

Exploitability Score

3.9

Impact Score

2.7

Base Severity

HIGH

This website uses the NVD API, but is not approved or certified by it.