Persistent Cross-site Scripting in Ibexa RichText Field Type
High severity
GitHub Reviewed
Published
Aug 14, 2024
in
ibexa/fieldtype-richtext
•
Updated Aug 16, 2024
Package
Affected versions
>= 4.6.0, < 4.6.10
Patched versions
4.6.10
Description
Published to the GitHub Advisory Database
Aug 14, 2024
Reviewed
Aug 14, 2024
Published by the National Vulnerability Database
Aug 16, 2024
Last updated
Aug 16, 2024
Impact
The validator for the RichText fieldtype blocklists
javascript:
andvbscript:
in links to prevent XSS. This can leave other options open, and the check can be circumvented using upper case. Content editing permissions for RichText content is required to exploit this vulnerability, which typically means Editor role or higher. The fix implements an allowlist instead, which allows only approved link protocols. The new check is case insensitive.Patches
Workarounds
None.
References
Credit
This vulnerability was discovered and reported to Ibexa by Alec Romano: https://github.com/4rdr
We thank them for reporting it responsibly to us.
How to report security issues:
https://doc.ibexa.co/en/latest/infrastructure_and_maintenance/security/reporting_issues/
References