← Volver a CVEs
CVE-2020-11051
MEDIUM6.9
Descripcion
In Wiki.js before 2.3.81, there is a stored XSS in the Markdown editor. An editor with write access to a page, using the Markdown editor, could inject an XSS payload into the content. If another editor (with write access as well) load the same page into the Markdown editor, the XSS payload will be executed as part of the preview panel. The rendered result does not contain the XSS payload as it is stripped by the HTML Sanitization security module. This vulnerability only impacts editors loading the malicious page in the Markdown editor. This has been patched in 2.3.81.
Detalles CVE
Puntuacion CVSS v3.16.9
SeveridadMEDIUM
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:N
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosHIGH
Interaccion usuarioREQUIRED
Publicado5/5/2020
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
requarks:wiki.js
Debilidades (CWE)
CWE-79CWE-79
Referencias
https://github.com/Requarks/wiki/commit/05e8a71ceff39167aee830ba8ad5eb0161f2911a(security-advisories@github.com)
https://github.com/Requarks/wiki/security/advisories/GHSA-vj72-c9vq-qxrv(security-advisories@github.com)
https://github.com/Requarks/wiki/commit/05e8a71ceff39167aee830ba8ad5eb0161f2911a(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/Requarks/wiki/security/advisories/GHSA-vj72-c9vq-qxrv(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.