CVE-2024-43368
August 14, 2024
The Trix editor, versions prior to 2.1.4, is vulnerable to XSS when pasting malicious code. This vulnerability is a bypass of the fix put in place for GHSA-qjqp-xr96-cj99. In pull request 1149, sanitation was added for Trix attachments with a "text/html" content type. However, Trix only checks the content type on the paste event's "dataTransfer" object. As long as the "dataTransfer" has a content type of "text/html", Trix parses its contents and creates an "Attachment" with them, even if the attachment itself doesn't have a "text/html" content type. Trix then uses the attachment content to set the attachment element's "innerHTML". An attacker could trick a user to copy and paste malicious code that would execute arbitrary JavaScript code within the context of the user's session, potentially leading to unauthorized actions being performed or sensitive information being disclosed. This vulnerability was fixed in version 2.1.4.
Affected Packages
trix (CDN_JS):
Affected version(s) >=0.9.0 <2.1.4Fix Suggestion:
Update to version 2.1.4trix (NPM):
Affected version(s) >=0.9.0 <2.1.4Fix Suggestion:
Update to version 2.1.4Related Resources (9)
Do you need more information?
Contact UsCVSS v4
Base Score:
7.1
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
PASSIVE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
NONE
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
6.5
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
NONE
Availability
NONE
Weakness Type (CWE)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
EPSS
Base Score:
0.39