Skip to content

Commit 797ead6

Browse files
committed
added advisories
1 parent 4d7c264 commit 797ead6

9 files changed

+135
-0
lines changed
Lines changed: 41 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,41 @@
1+
---
2+
title: "HtmlSanitizer vulnerable to Cross-site Scripting in Foreign Content"
3+
date: 2023-10-04
4+
tags:
5+
- "xss"
6+
- "mxss"
7+
- "bypass"
8+
advisory: true
9+
origin: https://github.com/advisories/GHSA-43cp-6p3q-2pc4
10+
cves:
11+
- CVE-2023-44390
12+
ghsas:
13+
- "GHSA-43cp-6p3q-2pc4"
14+
---
15+
# Impact
16+
The vulnerability occurs in configurations where foreign content is allowed, i.e. either `svg` or `math` are in the list of allowed elements.
17+
Specifically, the requirements for the vulnerability are:
18+
19+
1. Allowing one foreign element: `svg`, or `math`
20+
2. Comments or one raw text element: `iframe`, `noembed`, `xmp`, `title`, `noframes`, `style` or `noscript`
21+
22+
Configurations that meet the above requirements plus the following are vulnerable to an additional vulnerability:
23+
24+
* Any HTML integration element: `title`, `desc`, `mi`, `mo`, `mn`, `ms`, `mtext`, `annotation-xml`.
25+
26+
In case an application sanitizes user input with a vulnerable configuration, an attacker could
27+
bypass the sanitization and inject arbitrary HTML, including JavaScript code.
28+
29+
Note that in the default configuration the vulnerability is not present.
30+
31+
# Patches
32+
The vulnerability has been fixed in versions 8.0.723 and 8.1.722-beta (preview version).
33+
34+
# Workarounds
35+
Disallow foreign elements `svg` and `math`. This is the case in the default configuration, which is therefore not affected by the vulnerability.
36+
37+
# References
38+
* [GHSA-43cp-6p3q-2pc4](https://github.com/mganss/HtmlSanitizer/security/advisories/GHSA-43cp-6p3q-2pc4)
39+
* [mganss/HtmlSanitizer@ab29319](https://github.com/mganss/HtmlSanitizer/commit/ab29319866c020f0cc11e6b92228cd8039196c6e)
40+
* https://nvd.nist.gov/vuln/detail/CVE-2023-44390
41+
Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
---
2+
title: "By-passing Cross-Site Scripting Protection in HTML Sanitizer"
3+
date: 2023-07-26
4+
tags:
5+
- "xss"
6+
- "mxss"
7+
- "bypass"
8+
advisory: true
9+
origin: https://github.com/advisories/GHSA-59jf-3q9v-rh6g
10+
cves:
11+
- CVE-2023-38500
12+
ghsas:
13+
- "GHSA-59jf-3q9v-rh6g"
14+
---
15+
# Problem
16+
Due to an encoding issue in the serialization layer, malicious markup nested in a noscript element was not encoded correctly. noscript is disabled in the default configuration, but might have been enabled in custom scenarios. This allows bypassing the cross-site scripting mechanism of typo3/html-sanitizer.
17+
18+
# Solution
19+
Update to typo3/html-sanitizer versions 1.5.1 or 2.1.2 that fix the problem described.
20+
21+
# Credits
22+
Thanks to David Klein and Yaniv Nizry who reported this issue, and to TYPO3 security team members Oliver Hader and Benjamin Franzke who fixed the issue.
23+
24+
# References
25+
* [TYPO3-CORE-SA-2023-002](https://typo3.org/security/advisory/typo3-core-sa-2023-002)
26+
* [GHSA-59jf-3q9v-rh6g](https://github.com/TYPO3/html-sanitizer/security/advisories/GHSA-59jf-3q9v-rh6g)
27+
* https://nvd.nist.gov/vuln/detail/CVE-2023-38500
28+
* [TYPO3/html-sanitizer@e3026f5](https://github.com/TYPO3/html-sanitizer/commit/e3026f589fef0be8c3574ee3f0a0bfbe33d7ebdb)
29+
* https://typo3.org/security/advisory/typo3-core-sa-2023-002

source/_posts/Mutation Cross-Site Scripting (mXSS) Vulnerabilities Discovered in Mozilla-Bleach.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ tags:
66
- "mozilla"
77
- "xss"
88
- "mxss"
9+
- "bypass"
910
advisory: false
1011
origin: https://checkmarx.com/blog/vulnerabilities-discovered-in-mozilla-bleach/
1112
cves:

source/_posts/Mutation Cross-Site Scripting in lxml.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@ tags:
55
- "python"
66
- "xss"
77
- "mxss"
8+
- "bypass"
89
advisory: true
910
origin: https://advisory.checkmarx.net/advisory/CX-2020-4286/
1011
cves:

source/_posts/Mutation XSS in Mozilla-bleach using comments.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ tags:
66
- "mozilla"
77
- "xss"
88
- "mxss"
9+
- "bypass"
910
advisory: true
1011
origin: https://advisory.checkmarx.net/advisory/CX-2021-4303/
1112
cves:

source/_posts/Mutation XSS in Mozilla-bleach via noscript.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ tags:
66
- "mozilla"
77
- "xss"
88
- "mxss"
9+
- "bypass"
910
advisory: true
1011
origin: https://advisory.checkmarx.net/advisory/CX-2020-4276/
1112
cves:

source/_posts/Mutation XSS in Mozilla-bleach via svg or math.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ tags:
66
- "mozilla"
77
- "xss"
88
- "mxss"
9+
- "bypass"
910
advisory: true
1011
origin: https://advisory.checkmarx.net/advisory/CX-2020-4277/
1112
cves:
Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
---
2+
title: "Vendure Cross Site Request Forgery vulnerability impacting all API requests"
3+
date: 2023-07-12
4+
tags:
5+
- "csrf"
6+
- "npm"
7+
advisory: true
8+
origin: https://github.com/advisories/GHSA-h9wq-xcqx-mqxm
9+
cves:
10+
ghsas:
11+
- "GHSA-h9wq-xcqx-mqxm"
12+
---
13+
## Impact
14+
Vendure is an e-commerce GraphQL framework with a number of APIs and different levels of
15+
authorization. By default the Cookie settings are insecure, having the SameSite setting as false
16+
which results in not having one (originates from the cookie-session npm package’s default
17+
settings).
18+
19+
# Patches
20+
Update to versions 2.0.3 or above.
21+
22+
# Workarounds
23+
Manually set the `authOptions.cookieOptions.sameSite` configuration option to `'strict'`, `'lax'` or `true`.
24+
25+
# References
26+
Are there any links users can visit to find out more?
27+
* [GHSA-h9wq-xcqx-mqxm](https://github.com/vendure-ecommerce/vendure/security/advisories/GHSA-h9wq-xcqx-mqxm)
28+
* [vendure-ecommerce/vendure@4a10d67](https://github.com/vendure-ecommerce/vendure/commit/4a10d6785a3bf792ddf84053cdf232c205b82c81)
Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
---
2+
title: "@vendure/admin-ui-plugin authenticated XSS"
3+
date: 2023-07-04
4+
tags:
5+
- "xss"
6+
- "npm"
7+
advisory: true
8+
origin: https://github.com/advisories/GHSA-gm68-572p-q28r
9+
cves:
10+
ghsas:
11+
- "GHSA-9f66-54xg-pc2c"
12+
---
13+
## Impact
14+
Vendure provides an authorization system with different levels of privileges. For example, an administrator cannot create another administrator.
15+
16+
In the admin UI, there are a couple of places with description inputs, such as inventory/collection catalog, shipping methods, promotions, and more.
17+
18+
While the WYSIWYG editor allows limited customization, altering the request data (not in the ui) saves and returns arbitrary HTML with no sanitization. Causing an XSS when viewing the page.
19+
20+
The impact of this XSS is privilege escalation. A user that can write any type of description can trigger the attack. Then any other user that visits the vulnerable page is prone to arbitrary Javascript code execution, giving the attacker ability to execute actions on behalf of this user.
21+
22+
# Patches
23+
Update to versions 2.0.3 or above.
24+
25+
# Workarounds
26+
Is there a way for users to fix or remediate the vulnerability without upgrading?
27+
28+
# References
29+
Are there any links users can visit to find out more?
30+
* [GHSA-gm68-572p-q28r](https://github.com/vendure-ecommerce/vendure/security/advisories/GHSA-gm68-572p-q28r)
31+
* [vendure-ecommerce/vendure@0cdc92b](https://github.com/vendure-ecommerce/vendure/commit/0cdc92b241e6fd4017ddfc9fbdca189fc7c1ada0)
32+
* https://github.com/vendure-ecommerce/vendure/blob/master/CHANGELOG.md#203-2023-07-04

0 commit comments

Comments
 (0)