trix@1.0.0 vulnerabilities

A rich text editor for everyday writing

  • latest version

    2.1.10

  • latest non vulnerable version

  • first published

    9 years ago

  • latest version published

    5 days ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the trix package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Cross-site Scripting (XSS)

    trix is a Rich Text Editor.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the pasting process due to improper input sanitization. An attacker can execute arbitrary JavaScript code within the user's session, potentially leading to unauthorized actions or sensitive information disclosure by tricking a user to copy and paste malicious code.

    Note:

    In addition to upgrading to the patched version, it is recommended to disallow browsers that don't support a Content Security Policy and setting CSP policies such as script-src 'self' to ensure that only scripts hosted on the same origin are executed, and explicitly prohibiting inline scripts using script-src-elem.

    How to fix Cross-site Scripting (XSS)?

    Upgrade trix to version 1.3.3, 2.1.9 or higher.

    >=1.0.0 <1.3.3>=2.0.0 <2.1.9
    • M
    Cross-site Scripting (XSS)

    trix is a Rich Text Editor.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper input sanitization of the Attachment object, which derives from an improper fix of CVE-2024-34341. An attacker can trick a user into copying and pasting malicious code that will trigger the exploitation of the vulnerability.

    How to fix Cross-site Scripting (XSS)?

    Upgrade trix to version 1.3.3, 2.1.4 or higher.

    <1.3.3>=2.0.0-alpha.0 <2.1.4
    • M
    Cross-site Scripting (XSS)

    trix is a Rich Text Editor.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper sanitization of pasted content from external sources into the editor. An attacker can execute arbitrary JavaScript code within the context of the user's session by embedding malicious scripts in the copied content. This is only exploitable if the Content Security Policy (CSP) does not adequately restrict inline scripts and external sources.

    How to fix Cross-site Scripting (XSS)?

    Upgrade trix to version 1.3.2, 2.1.1 or higher.

    >=0.9.0 <1.3.2>=2.0.0 <2.1.1
    • L
    Cross-site Scripting (XSS)

    trix is a Rich Text Editor.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS). The javascript protocol URIs are not removed during the sanitizing of href values.

    How to fix Cross-site Scripting (XSS)?

    Upgrade trix to version 1.2.3 or higher.

    <1.2.3
    • M
    Cross-site Scripting (XSS)

    trix is a Rich Text Editor.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS). It was possible to execute JavaScript on Trix Editor by pasting specially crafted HTML.

    How to fix Cross-site Scripting (XSS)?

    Upgrade trix to version 1.2.2 or higher.

    <1.2.2