File tree Expand file tree Collapse file tree 3 files changed +125
-0
lines changed
Expand file tree Collapse file tree 3 files changed +125
-0
lines changed Original file line number Diff line number Diff line change 1+ ---
2+ layout : advisory
3+ title : ' CVE-2023-46950 (sidekiq-unique-jobs): Cross Site Scripting vulnerability in
4+ Contribsys Sidekiq'
5+ comments : false
6+ categories :
7+ - sidekiq-unique-jobs
8+ advisory :
9+ gem : sidekiq-unique-jobs
10+ cve : 2023-46950
11+ ghsa : fhx8-5c23-x7x5
12+ url : https://github.com/mhenrixon/sidekiq-unique-jobs/security/advisories/GHSA-cmh9-rx85-xj38
13+ title : Cross Site Scripting vulnerability in Contribsys Sidekiq
14+ date : 2024-03-01
15+ description : |
16+ Cross Site Scripting vulnerability in Contribsys Sidekiq v.6.5.8
17+ allows a remote attacker to obtain sensitive information via a
18+ crafted URL to the filter functions.
19+ cvss_v3 : 6.1
20+ patched_versions :
21+ - " ~> 7.1.33"
22+ - " >= 8.0.7"
23+ related :
24+ url :
25+ - https://nvd.nist.gov/vuln/detail/CVE-2023-46950
26+ - https://github.com/mhenrixon/sidekiq-unique-jobs/security/advisories/GHSA-cmh9-rx85-xj38
27+ - https://github.com/mhenrixon/sidekiq-unique-jobs/releases/tag/v8.0.7
28+ - https://www.mgm-sp.com/cve/sidekiq-unique-jobs-reflected-xss-cve-2023-46950-cve-2023-46951
29+ - https://github.com/mhenrixon/sidekiq-unique-jobs/pull/829
30+ - https://github.com/mhenrixon/sidekiq-unique-jobs/commit/cd09ba6108f98973b6649a6149790c3d4502b4cc
31+ - https://github.com/mhenrixon/sidekiq-unique-jobs/commit/ec3afd920c1b55843c72f748a87baac7f8be82ed
32+ - https://github.com/advisories/GHSA-fhx8-5c23-x7x5
33+ ---
Original file line number Diff line number Diff line change 1+ ---
2+ layout : advisory
3+ title : ' CVE-2024-32034 (decidim-admin): Decidim::Admin vulnerable to cross-site scripting
4+ (XSS) in the admin activity log'
5+ comments : false
6+ categories :
7+ - decidim-admin
8+ advisory :
9+ gem : decidim-admin
10+ cve : 2024-32034
11+ ghsa : rx9f-5ggv-5rh6
12+ url : https://github.com/decidim/decidim/security/advisories/GHSA-rx9f-5ggv-5rh6
13+ title : Decidim::Admin vulnerable to cross-site scripting (XSS) in the admin activity
14+ log
15+ date : 2024-09-16
16+ description : |
17+ ### Impact
18+ The admin panel is subject to potential XSS attach in case an admin
19+ assigns a valuator to a proposal, or does any other action that
20+ generates an admin activity log where one of the resources has an
21+ XSS crafted.
22+
23+ ### Patches
24+ N/A
25+
26+ ### Workarounds
27+ Redirect the pages /admin and /admin/logs to other admin pages
28+ to prevent this access (i.e. `/admin/organization/edit`)
29+
30+ ### References
31+ OWASP ASVS v4.0.3-5.1.3
32+ cvss_v3 : 6.8
33+ patched_versions :
34+ - " ~> 0.27.7"
35+ - " >= 0.28.2"
36+ related :
37+ url :
38+ - https://nvd.nist.gov/vuln/detail/CVE-2024-32034
39+ - https://github.com/decidim/decidim/security/advisories/GHSA-rx9f-5ggv-5rh6
40+ - https://github.com/decidim/decidim/commit/23fc8d702a4976727f78617f5e42353d67931645
41+ - https://github.com/decidim/decidim/commit/9d79f09a2d38c87feb28725670d6cc1f55c22072
42+ - https://github.com/decidim/decidim/commit/e494235d559be13dd1f8694345e6f6bba762d1c0
43+ - https://github.com/decidim/decidim/commit/ff755e23814aeb56e9089fc08006a5d3faee47b6
44+ - https://github.com/advisories/GHSA-rx9f-5ggv-5rh6
45+ ---
Original file line number Diff line number Diff line change 1+ ---
2+ layout : advisory
3+ title : ' CVE-2024-39910 (decidim): Decidim::Admin vulnerable to cross-site scripting
4+ (XSS) in the admin panel with QuillJS WYSWYG editor'
5+ comments : false
6+ categories :
7+ - decidim
8+ advisory :
9+ gem : decidim
10+ cve : 2024-39910
11+ ghsa : vvqw-fqwx-mqmm
12+ url : https://github.com/decidim/decidim/security/advisories/GHSA-vvqw-fqwx-mqmm
13+ title : Decidim::Admin vulnerable to cross-site scripting (XSS) in the admin panel
14+ with QuillJS WYSWYG editor
15+ date : 2024-09-16
16+ description : |
17+ ### Impact
18+ The WYSWYG editor QuillJS is subject to potential XSS attach in
19+ case the attacker manages to modify the HTML before being
20+ uploaded to the server.
21+
22+ The attacker is able to change e.g. to <svg onload=alert('XSS')>
23+ if they know how to craft these requests themselves.
24+
25+ ### Patches
26+ N/A
27+
28+ ### Workarounds
29+ Review the user accounts that have access to the admin panel (i.e.
30+ general Administrators, and participatory space's Administrators)
31+ and remove access to them if they don't need it.
32+
33+ Disable the "Enable rich text editor for participants" setting in
34+ the admin dashboard.
35+
36+ ### References
37+ OWASP ASVS v4.0.3-5.1.3
38+ cvss_v3 : 5.4
39+ patched_versions :
40+ - " >= 0.27.7"
41+ related :
42+ url :
43+ - https://nvd.nist.gov/vuln/detail/CVE-2024-39910
44+ - https://github.com/decidim/decidim/security/advisories/GHSA-vvqw-fqwx-mqmm
45+ - https://github.com/decidim/decidim/commit/47adca81cabea898005ec07b130b008f2a2be99f
46+ - https://github.com/advisories/GHSA-vvqw-fqwx-mqmm
47+ ---
You can’t perform that action at this time.
0 commit comments