org.webjars.bowergithub.summernote:summernote@0.8.10

  • latest version

    0.8.20

  • first published

    7 years ago

  • latest version published

    4 years ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the org.webjars.bowergithub.summernote:summernote package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Cross-site Scripting (XSS)

    org.webjars.bowergithub.summernote:summernote is a super simple WYSIWYG Editor.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in the WYSIWYG editor on the front page. An attacker can inject and execute malicious scripts by crafting input that is improperly sanitized.

    How to fix Cross-site Scripting (XSS)?

    There is no fixed version for org.webjars.bowergithub.summernote:summernote.

    [0,)
    • M
    Cross-site Scripting (XSS)

    org.webjars.bowergithub.summernote:summernote is a super simple WYSIWYG Editor.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the createLink function in the Editor class. An attacker can execute arbitrary code by injecting a crafted script.

    Note:

    This is only exploitable if the attacker can access the editor component.

    How to fix Cross-site Scripting (XSS)?

    A fix was pushed into the master branch but not yet published.

    [0,)
    • M
    Cross-site Scripting (XSS)

    org.webjars.bowergithub.summernote:summernote is a super simple WYSIWYG Editor.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS). It is possible to inject malicious JavaScript within the myforms area due to no sanitization.

    PoC

    from crispy_forms.helper import FormHelper
    from crispy_forms.layout import Submit, Column, Row, Layout
    from django.forms import HiddenInput
    from django.utils.translation import ugettext as _
    from django import forms
    from django_summernote.widgets import SummernoteInplaceWidget
    
    from myapp.models import MyModel
    
    
    class MyForm(forms.ModelForm):
    
        def __init__(self, *args, **kwargs):
            super(MyForm, self).__init__(*args, **kwargs)
            self.helper = FormHelper()
            self.helper.layout = Layout(
                Row(Column('title', css_class='form-group col-md-6'), css_class='form-row'),
                Row(Column('base_template', css_class='form-group col-md-12'), css_class='form-row'),
                Row(Column('base_css_template', css_class='form-group col-md-6', ), css_class='form-row'),
                'doc',
                Submit('submit', _('Save'))
            )
    
        class Meta:
            model = MyModel
            fields = '__all__'
            widgets = {
                'base_template': SummernoteInplaceWidget(attrs={'summernote': {'width': '100%', 'height': '600px'}}),
                'document_type': HiddenInput()
            }
            labels = {
                'title': _('Title'),
                'base_template': _('Body'),
                'base_css_template': _('CSS stylesheet (optional)'),
                'doc': _('Doc'),
            }
    
    

    How to fix Cross-site Scripting (XSS)?

    Upgrade org.webjars.bowergithub.summernote:summernote to version 0.8.19 or higher.

    [0,0.8.19)
    • M
    Cross-site Scripting (XSS)

    org.webjars.bowergithub.summernote:summernote is a super simple WYSIWYG Editor.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to a lack of sanitization in some text fields.

    How to fix Cross-site Scripting (XSS)?

    Upgrade org.webjars.bowergithub.summernote:summernote to version 0.8.12 or higher.

    [,0.8.12)