-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
One remaining CVE #1
Comments
6484 is questionable (weak?) I suggest to look at fixing 6485 first: |
Is a solution where tags would just be stripped ok? |
Yes agreed, I think as long as it is a narrow scope of stripping to just the cve scope , should be ok to strip |
6485 should be first |
Is 6484 even valid? One can put such link to any anchor with href |
I agree, 6484 doesn't make any sense to me and it hasn't been fully evaluated by the CVE folks. NVD assessment not yet provided. The only one of these two CVEs that makes any sense to me would be 6485. With that said, NVD hasn't assessed yet, would like to see what they say. |
My previous comment below was based on an incomplete understanding of how the carousel navigation works. You can use either the If I understand this correctly, the bootstrap carousel uses anchor tags for the navigation buttons. Each anchor is expected to have a |
@KlemenDEV does the explanation by @sgdowney help? There's probably an easy fix here from the sound of it. |
I am still not sure if this is a valid CVE. This would require the attacker to have access to href, which is unusual for the carousel if it is unused. If JS alters href on the go, the same JS could also do what JS in href would do directly. If the problem is only in cases where JS is placed in href during HTML building, this issue can be fixed by stripping href on DOM load for example, but this does not make much sense to me. If the problem is if href also changes later, not sure how to prevent that, and also in this case as I said the code that changes href could execute stuff directly without placing itself in href and waiting for the user to click it. |
This is a tricky one. The carousel navigation will first use the
|
This CVE assumes the generated HTML is not sanitized. At least in Drupal Boostrap theme, data-target is fixed and thus can't really be exploited |
The text was updated successfully, but these errors were encountered: