Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-43368
Summary
The Trix editor, in versions prior to 2.1.4, is vulnerable to XSS when pasting malicious code. This vulnerability bypasses the fix put in place for GHSA-qjqp-xr96-cj99. In pull request 1149, sanitation was added for Trix attachments with a "text/html" content type. However, Trix only checks the content type on the paste event's "dataTransfer" object. As long as the "dataTransfer" has a content type of "text/html," Trix parses its contents and creates an "Attachment" with them, even if the attachment itself doesn't have a "text/html" content type. Trix then uses the attachment content to set the attachment element's "innerHTML." An attacker could trick a user into copying and pasting malicious code that would execute arbitrary JavaScript code within the context of the user's session, potentially leading to unauthorized actions or sensitive information being disclosed.
- LOW
- NETWORK
- NONE
- UNCHANGED
- REQUIRED
- NONE
- HIGH
- NONE
CWE-79 - Cross Site Scripting
Cross-Site Scripting, commonly referred to as XSS, is the most dominant class of vulnerabilities. It allows an attacker to inject malicious code into a pregnable web application and victimize its users. The exploitation of such a weakness can cause severe issues such as account takeover, and sensitive data exfiltration. Because of the prevalence of XSS vulnerabilities and their high rate of exploitation, it has remained in the OWASP top 10 vulnerabilities for years.
References
Advisory Timeline
- Published