org.webjars.bowergithub.summernote:summernote@0.8.10 vulnerabilities

  • latest version

    0.8.20

  • first published

    6 years ago

  • latest version published

    3 years ago

  • licenses detected

  • package manager

Direct Vulnerabilities

Known vulnerabilities in the org.webjars.bowergithub.summernote:summernote package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Cross-site Scripting (XSS)

org.webjars.bowergithub.summernote:summernote is a super simple WYSIWYG Editor.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in the WYSIWYG editor on the front page. An attacker can inject and execute malicious scripts by crafting input that is improperly sanitized.

How to fix Cross-site Scripting (XSS)?

There is no fixed version for org.webjars.bowergithub.summernote:summernote.

[0,)
  • M
Cross-site Scripting (XSS)

org.webjars.bowergithub.summernote:summernote is a super simple WYSIWYG Editor.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the createLink function in the Editor class. An attacker can execute arbitrary code by injecting a crafted script.

Note:

This is only exploitable if the attacker can access the editor component.

How to fix Cross-site Scripting (XSS)?

A fix was pushed into the master branch but not yet published.

[0,)
  • M
Cross-site Scripting (XSS)

org.webjars.bowergithub.summernote:summernote is a super simple WYSIWYG Editor.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). It is possible to inject malicious JavaScript within the myforms area due to no sanitization.

PoC

from crispy_forms.helper import FormHelper
from crispy_forms.layout import Submit, Column, Row, Layout
from django.forms import HiddenInput
from django.utils.translation import ugettext as _
from django import forms
from django_summernote.widgets import SummernoteInplaceWidget

from myapp.models import MyModel


class MyForm(forms.ModelForm):

    def __init__(self, *args, **kwargs):
        super(MyForm, self).__init__(*args, **kwargs)
        self.helper = FormHelper()
        self.helper.layout = Layout(
            Row(Column('title', css_class='form-group col-md-6'), css_class='form-row'),
            Row(Column('base_template', css_class='form-group col-md-12'), css_class='form-row'),
            Row(Column('base_css_template', css_class='form-group col-md-6', ), css_class='form-row'),
            'doc',
            Submit('submit', _('Save'))
        )

    class Meta:
        model = MyModel
        fields = '__all__'
        widgets = {
            'base_template': SummernoteInplaceWidget(attrs={'summernote': {'width': '100%', 'height': '600px'}}),
            'document_type': HiddenInput()
        }
        labels = {
            'title': _('Title'),
            'base_template': _('Body'),
            'base_css_template': _('CSS stylesheet (optional)'),
            'doc': _('Doc'),
        }

How to fix Cross-site Scripting (XSS)?

Upgrade org.webjars.bowergithub.summernote:summernote to version 0.8.19 or higher.

[0,0.8.19)
  • M
Cross-site Scripting (XSS)

org.webjars.bowergithub.summernote:summernote is a super simple WYSIWYG Editor.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to a lack of sanitization in some text fields.

How to fix Cross-site Scripting (XSS)?

Upgrade org.webjars.bowergithub.summernote:summernote to version 0.8.12 or higher.

[,0.8.12)