Lucene search

K
cveGitHub_MCVE-2024-40626
HistoryJul 16, 2024 - 5:15 p.m.

CVE-2024-40626

2024-07-1617:15:11
CWE-79
GitHub_M
web.nvd.nist.gov
27
outline
cross-site scripting
prosemirror
type confusion
cve-2024-40626
stored xss
csp
upgrade

CVSS3

7.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N

AI Score

6.2

Confidence

High

EPSS

0

Percentile

9.3%

Outline is an open source, collaborative document editor. A type confusion issue was found in ProseMirror’s rendering process that leads to a Stored Cross-Site Scripting (XSS) vulnerability in Outline. An authenticated user can create a document containing a malicious JavaScript payload. When other users view this document, the malicious Javascript can execute in the origin of Outline. Outline includes CSP rules to prevent third-party code execution, however in the case of self-hosting and having your file storage on the same domain as Outline a malicious payload can be uploaded as a file attachment and bypass those CSP restrictions. This issue has been addressed in release version 0.77.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Affected configurations

Vulners
Vulnrichment
Node
outlineoutlineRange<0.77.3
VendorProductVersionCPE
outlineoutline*cpe:2.3:a:outline:outline:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "outline",
    "product": "outline",
    "versions": [
      {
        "version": "< 0.77.3",
        "status": "affected"
      }
    ]
  }
]

CVSS3

7.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N

AI Score

6.2

Confidence

High

EPSS

0

Percentile

9.3%

Related for CVE-2024-40626