Id:
CVE-2021-29434
Comment
:
Wagtail is a Django content management system. In affected versions of Wagtail, when saving the contents of a rich text field in the admin interface, Wagtail does not apply server-side checks to ensure that link URLs use a valid protocol. A malicious user with access to the admin interface could thus craft a POST request to publish content with `javascript:` URLs containing arbitrary code. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin. See referenced GitHub advisory for additional details, including a workaround. Patched versions have been released as Wagtail 2.11.7 (for the LTS 2.11 branch) and Wagtail 2.12.4 (for the current 2.12 branch).
CVSSv2 Score:
3.5
Access vector:
|
NETWORK
|
Access complexity:
|
MEDIUM
|
Authentication:
|
SINGLE
|
Confidentiality impact:
|
NONE
|
Integrity impact:
|
PARTIAL
|
Availability impact:
|
NONE
|
CVSSv2 Vector:
AV:N/AC:M/Au:S/C:N/I:P/A:N
CVSSv3 Score:
4.8
Attack vector:
|
NETWORK
|
Attack complexity:
|
LOW
|
Privileges required:
|
HIGH
|
User interaction:
|
REQUIRED
|
Scope:
|
CHANGED
|
Confidentiality impact:
|
LOW
|
Integrity impact:
|
LOW
|
Availability impact:
|
NONE
|
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
References: