summernote@0.8.13

Super simple WYSIWYG editor

  • latest version

    0.9.1

  • first published

    11 years ago

  • latest version published

    1 years ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the summernote package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Cross-site Scripting (XSS)

    summernote is a super simple WYSIWYG Editor.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in the WYSIWYG editor on the front page. An attacker can inject and execute malicious scripts by crafting input that is improperly sanitized.

    How to fix Cross-site Scripting (XSS)?

    There is no fixed version for summernote.

    *
    • M
    Cross-site Scripting (XSS)

    summernote is a super simple WYSIWYG Editor.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the createLink function in the Editor class. An attacker can execute arbitrary code by injecting a crafted script.

    Note:

    This is only exploitable if the attacker can access the editor component.

    How to fix Cross-site Scripting (XSS)?

    Upgrade summernote to version 0.9.0 or higher.

    <0.9.0
    • M
    Cross-site Scripting (XSS)

    summernote is a super simple WYSIWYG Editor.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS). It is possible to inject malicious JavaScript within the myforms area due to no sanitization.

    PoC

    from crispy_forms.helper import FormHelper
    from crispy_forms.layout import Submit, Column, Row, Layout
    from django.forms import HiddenInput
    from django.utils.translation import ugettext as _
    from django import forms
    from django_summernote.widgets import SummernoteInplaceWidget
    
    from myapp.models import MyModel
    
    
    class MyForm(forms.ModelForm):
    
        def __init__(self, *args, **kwargs):
            super(MyForm, self).__init__(*args, **kwargs)
            self.helper = FormHelper()
            self.helper.layout = Layout(
                Row(Column('title', css_class='form-group col-md-6'), css_class='form-row'),
                Row(Column('base_template', css_class='form-group col-md-12'), css_class='form-row'),
                Row(Column('base_css_template', css_class='form-group col-md-6', ), css_class='form-row'),
                'doc',
                Submit('submit', _('Save'))
            )
    
        class Meta:
            model = MyModel
            fields = '__all__'
            widgets = {
                'base_template': SummernoteInplaceWidget(attrs={'summernote': {'width': '100%', 'height': '600px'}}),
                'document_type': HiddenInput()
            }
            labels = {
                'title': _('Title'),
                'base_template': _('Body'),
                'base_css_template': _('CSS stylesheet (optional)'),
                'doc': _('Doc'),
            }
    
    

    How to fix Cross-site Scripting (XSS)?

    Upgrade summernote to version 0.8.19 or higher.

    <0.8.19