In Wiki.js before 2.4.107, there is a stored cross-site scripting through template injection. This vulnerability exists due to an insecure validation mechanism intended to insert v-pre tags into rendered HTML elements which contain curly-braces. By creating a crafted wiki page, a malicious Wiki.js user may stage a stored cross-site scripting attack. This allows the attacker to execute malicious JavaScript when the page is viewed by other users. This has been patched in 2.4.107.
References
Link | Resource |
---|---|
https://github.com/Requarks/wiki/security/advisories/GHSA-9jgg-4xj2-vjjj | Third Party Advisory |
https://github.com/Requarks/wiki/commit/9e08718ee904046f8b2294ef6ac79e8a75a451e3 | Patch Third Party Advisory |
Configurations
Information
Published : 2020-06-16 15:15
Updated : 2020-06-22 13:45
NVD link : CVE-2020-4052
Mitre link : CVE-2020-4052
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
requarks
- wiki.js