CVE-2023-41167

@webiny/react-rich-text-renderer before 5.37.2 allows XSS attacks by content managers. This is a react component to render data coming from Webiny Headless CMS and Webiny Form Builder. Webiny is an open-source serverless enterprise CMS. The @webiny/react-rich-text-renderer package depends on the editor.js rich text editor to handle rich text content. The CMS stores rich text content from the editor.js into the database. When the @webiny/react-rich-text-renderer is used to render such content, it uses the dangerouslySetInnerHTML prop, without applying HTML sanitization. The issue arises when an actor, who in this context would specifically be a content manager with access to the CMS, inserts a malicious script as part of the user-defined input. This script is then injected and executed within the user's browser when the main page or admin page loads.
Configurations

Configuration 1 (hide)

cpe:2.3:a:webiny:webiny:*:*:*:*:*:node.js:*:*

History

21 Nov 2024, 08:20

Type Values Removed Values Added
Summary
  • (es) @webiny/react-rich-text-renderer antes de 5.37.2 permite ataques Cross-Site Scripting (XSS) por parte de gestores de contenido. Se trata de un componente react para renderizar datos procedentes de Webiny Headless CMS y Webiny Form Builder. Webiny es un CMS empresarial sin servidor de código abierto. El paquete @webiny/react-rich-text-renderer depende del editor de texto enriquecido editor.js para manejar contenido de texto enriquecido. El CMS almacena el contenido de texto enriquecido del editor.js en la base de datos. Cuando el @webiny/react-rich-text-renderer se utiliza para renderizar dicho contenido, utiliza la prop peligrosamenteSetInnerHTML, sin aplicar la limpieza HTML. El problema surge cuando un actor, que en este contexto sería específicamente un gestor de contenidos con acceso al CMS, inserta un script malicioso como parte de la entrada definida por el usuario. Este script se inyecta y ejecuta en el navegador del usuario cuando se carga la página principal o la página de administración.
References () https://github.com/webiny/webiny-js/security/advisories/GHSA-3x59-vrmc-5mx6 - Vendor Advisory () https://github.com/webiny/webiny-js/security/advisories/GHSA-3x59-vrmc-5mx6 - Vendor Advisory
References () https://webiny.com - Product () https://webiny.com - Product

Information

Published : 2023-08-25 14:15

Updated : 2024-11-21 08:20


NVD link : CVE-2023-41167

Mitre link : CVE-2023-41167

CVE.ORG link : CVE-2023-41167


JSON object : View

Products Affected

webiny

  • webiny
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')