|
Message-ID: <f95ff094-ddc0-46b7-8fb3-2bcbd06efacc@census-labs.com> Date: Wed, 8 Nov 2023 17:51:24 +0200 From: Harry Maraziaris <cmaraziaris@...sus-labs.com> To: oss-security@...ts.openwall.com Subject: CVE-2023-46857 - Weak SVG asset filtering mechanism in Squidex leads to XSS Hello all, Squidex, a "headless" open source CMS framework was found to have a stored XSS vulnerability in the "Upload Assets" functionality due to insufficient SVG element filtering. The vulnerability affects all versions of the framework prior to 7.9.0. CVE-2023-46857 was assigned to this vulnerability by MITRE. The vulnerability affects authenticated users of the Squidex CMS Web application and allows for malicious JavaScript to be executed within victim user browsers. Moreover, the vulnerability enables an attacker to collect the CMS authentication token from browser local storage and it is therefore possible for the attacker to gain unauthorized access to a victim user's session. More information about this issue is available here: https://census-labs.com/news/2023/11/08/weak-svg-asset-filtering-mechanism-in-squidex-cms/ Best regards, Charalampos Maraziaris -- Charalampos Maraziaris IT Security Engineer CENSUS S.A. - https://census-labs.com Download attachment "OpenPGP_0xD2A107C04EE32300.asc" of type "application/pgp-keys" (3164 bytes) Download attachment "OpenPGP_signature.asc" of type "application/pgp-signature" (841 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.