漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Cross-site scripting (XSS) in the decidim admin panel with QuillJS WYSWYG editor
Vulnerability Description
decidim is a Free Open-Source participatory democracy, citizen participation and open government for cities and organizations. The WYSWYG editor QuillJS is subject to potential XSS attach in case the attacker manages to modify the HTML before being uploaded to the server. The attacker is able to change e.g. to <svg onload=alert('XSS')> if they know how to craft these requests themselves. This issue has been addressed in release version 0.27.7. All users are advised to upgrade. Users unable to upgrade should review the user accounts that have access to the admin panel (i.e. general Administrators, and participatory space's Administrators) and remove access to them if they don't need it. Disable the "Enable rich text editor for participants" setting in the admin dashboard
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Vulnerability Title
Decidim 跨站脚本漏洞
Vulnerability Description
Decidim是Decidim开源的一个参与式民主框架,用 Ruby on Rails 编写。 Decidim 0.27.6版本及之前版本存在跨站脚本漏洞,该漏洞源于所使用的WYSIWYG编辑器QuillJS可能受到跨站脚本攻击。
CVSS Information
N/A
Vulnerability Type
N/A