Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <f95ff094-ddc0-46b7-8fb3-2bcbd06efacc@census-labs.com>
Date: Wed, 8 Nov 2023 17:51:24 +0200
From: Harry Maraziaris <cmaraziaris@...sus-labs.com>
To: oss-security@...ts.openwall.com
Subject: CVE-2023-46857 - Weak SVG asset filtering mechanism in Squidex leads
 to XSS

Hello all,

Squidex, a "headless" open source CMS framework was found to have a 
stored XSS vulnerability in the "Upload Assets" functionality due to 
insufficient SVG element filtering. The vulnerability affects all 
versions of the framework prior to 7.9.0.

CVE-2023-46857 was assigned to this vulnerability by MITRE.

The vulnerability affects authenticated users of the Squidex CMS Web 
application and allows for malicious JavaScript to be executed within 
victim user browsers. Moreover, the vulnerability enables an attacker to 
collect the CMS authentication token from browser local storage and it 
is therefore possible for the attacker to gain unauthorized access to a 
victim user's session.

More information about this issue is available here:
https://census-labs.com/news/2023/11/08/weak-svg-asset-filtering-mechanism-in-squidex-cms/

Best regards,

Charalampos Maraziaris

-- 
Charalampos Maraziaris
IT Security Engineer
CENSUS S.A. - https://census-labs.com


Download attachment "OpenPGP_0xD2A107C04EE32300.asc" of type "application/pgp-keys" (3164 bytes)

Download attachment "OpenPGP_signature.asc" of type "application/pgp-signature" (841 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.