跳转到帖子

FreeBSD: VID-17EFBE19-4E72-426A-8016-2B4E001C1378 (CVE-2023-28836): py-wagtail -- stored XSS vulnerability

recommended_posts

发布于
  • Members

FreeBSD: VID-17EFBE19-4E72-426A-8016-2B4E001C1378 (CVE-2023-28836): py-wagtail -- stored XSS vulnerability

Severity
5
CVSS
(AV:N/AC:M/Au:S/C:P/I:P/A:N)
Published
04/03/2023
Created
09/05/2023
Added
09/01/2023
Modified
01/28/2025

Description

Wagtail is an open source content management system built on Django. Starting in version 1.5 and prior to versions 4.1.4 and 4.2.2, a stored cross-site scripting (XSS) vulnerability exists on ModelAdmin views within the Wagtail admin interface. A user with a limited-permission editor account for the Wagtail admin could potentially craft pages and documents that, when viewed by a user with higher privileges, could perform actions with that user's credentials. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin, and only affects sites with ModelAdmin enabled. For page, the vulnerability is in the "Choose a parent page" ModelAdmin view (`ChooseParentView`), available when managing pages via ModelAdmin. For documents, the vulnerability is in the ModelAdmin Inspect view (`InspectView`) when displaying document fields. Patched versions have been released as Wagtail 4.1.4 and Wagtail 4.2.2. Site owners who are unable to upgrade to the new versions can disable or override the corresponding functionality.

Solution(s)

  • freebsd-upgrade-package-py310-wagtail
  • freebsd-upgrade-package-py311-wagtail
  • freebsd-upgrade-package-py37-wagtail
  • freebsd-upgrade-package-py38-wagtail
  • freebsd-upgrade-package-py39-wagtail

References

  • CVE-2023-28836
  • 查看数 696
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…