In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Arbitrary Code Execution vulnerabilities in an interactive lesson.
Start learningUpgrade quill
to version 1.0.4 or higher.
quill
is powerful, rich text editor.
Affected versions of the package are vulnerable to Arbitrary Code Execution due to not sanitizing user input when in the pasteHTML()
function. The function was renamed, deprecated and was set to be removed in version 2.0.0
.
var quill = new Quill('#editor', { theme: 'snow' });
quill.pasteHTML('<img src=// onerror="alert('Not Found!')">');