** DISPUTED ** A vulnerability in the HTML editor of Slab Quill 4.8.0 allows an attacker to execute arbitrary JavaScript by storing an XSS payload (a crafted onloadstart attribute of an IMG element) in a text field. Note: Researchers have claimed that this issue is not within the product itself, but is intended behavior in a web browser.
References
Link | Resource |
---|---|
https://quilljs.com | Product |
https://burninatorsec.blogspot.com/2021/04/cve-2021-3163-xss-slab-quill-js.html | Exploit Third Party Advisory |
https://github.com/quilljs/quill/issues/3273 | Broken Link Issue Tracking Third Party Advisory |
https://github.com/quilljs/quill/issues/3364 | Exploit Issue Tracking Third Party Advisory |
Configurations
Information
Published : 2021-04-12 14:15
Updated : 2021-11-05 20:33
NVD link : CVE-2021-3163
Mitre link : CVE-2021-3163
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
slab
- quill