跳转到帖子

A Cross-Site Scripting (XSS) vulnerability in TinyMCE was addressed in the upgrade from version 7.1.1 to 7.2.0

recommended_posts

发布于
  • Members

A Cross-Site Scripting (XSS) vulnerability in TinyMCE was addressed in the upgrade from version 7.1.1 to 7.2.0

Severity
6
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:N)
Published
01/20/2025
Created
01/16/2025
Added
01/20/2025
Modified
01/20/2025

Description

TinyMCE is an open source rich text editor. A cross-site scripting (XSS) vulnerability was discovered in TinyMCE’s content extraction code. When using the `noneditable_regexp` option, specially crafted HTML attributes containing malicious code were able to be executed when content was extracted from the editor. This vulnerability has been patched in TinyMCE 7.2.0, TinyMCE 6.8.4 and TinyMCE 5.11.0 LTS by ensuring that, when using the `noneditable_regexp` option, any content within an attribute is properly verified to match the configured regular expression before being added. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Solution(s)

  • zimbra-collaboration-upgrade-latest

References

  • https://attackerkb.com/topics/cve-2024-38356
  • CVE - 2024-38356
  • https://github.com/tinymce/tinymce/security/advisories/GHSA-9hcv-j9pv-qmph
  • https://github.com/tinymce/tinymce/commit/5acb741665a98e83d62b91713c800abbff43b00d
  • https://owasp.org/www-community/attacks/xss
  • https://www.tiny.cloud/docs/tinymce/6/6.8.4-release-notes/#overview
  • https://www.tiny.cloud/docs/tinymce/7/7.2-release-notes/#overview
  • 查看数 708
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…