Lucene search

K
githubGitHub Advisory DatabaseGHSA-V2WC-PFQ2-5CM6
HistoryApr 14, 2020 - 11:09 p.m.

Possible XSS attack in Wagtail

2020-04-1423:09:29
CWE-80
GitHub Advisory Database
github.com
50

3.5 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

6.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

39.3%

Impact

A cross-site scripting (XSS) vulnerability exists on the page revision comparison view within the Wagtail admin interface. A user with a limited-permission editor account for the Wagtail admin could potentially craft a page revision history that, when viewed by a user with higher privileges, could perform actions with that user’s credentials. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin.

Patches

Patched versions have been released as Wagtail 2.7.2 (for the LTS 2.7 branch) and Wagtail 2.8.1 (for the current 2.8 branch).

Workarounds

Site owners who are unable to upgrade to the new versions can disable the revision comparison view by adding the following URL route to the top of their project’s urls.py configuration:

from django.views.generic.base import RedirectView

urlpatterns = [
    url(r'^admin/pages/(\d+)/revisions/compare/', RedirectView.as_view(url='/admin/')),
    # ...
]

Acknowledgements

Many thanks to Vlad Gerasimenko for reporting this issue.

For more information

If you have any questions or comments about this advisory:

Affected configurations

Vulners
Node
wagtailwagtailMatch2.8.0
OR
wagtailwagtailRange1.9.0
OR
wagtailwagtailRange<2.7.2
CPENameOperatorVersion
wagtaileq2.8.0
wagtailge1.9.0
wagtaillt2.7.2

3.5 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

6.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

39.3%