Cross-site scripting (XSS) vulnerability in Progress Kendo UI Editor v2018.1.221 allows remote attackers to inject arbitrary JavaScript into the DOM of the WYSIWYG editor because of the editorNS.Serializer toEditableHtml function in kendo.all.min.js. If the victim accesses the editor, the payload gets executed. Furthermore, if the payload is reflected at any other resource that does rely on the sanitisation of the editor itself, the JavaScript payload will be executed in the context of the application. This allows attackers (in the worst case) to take over user sessions.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2018/Sep/49 | Mailing List Third Party Advisory |
http://seclists.org/fulldisclosure/2018/Sep/50 | Mailing List Third Party Advisory |
https://www.sec-consult.com/en/blog/advisories/stored-cross-site-scripting-in-kendo-ui-editor-cve-2018-14037/ | Exploit Technical Description Third Party Advisory |
http://seclists.org/fulldisclosure/2018/Sep/49 | Mailing List Third Party Advisory |
http://seclists.org/fulldisclosure/2018/Sep/50 | Mailing List Third Party Advisory |
https://www.sec-consult.com/en/blog/advisories/stored-cross-site-scripting-in-kendo-ui-editor-cve-2018-14037/ | Exploit Technical Description Third Party Advisory |
Configurations
History
21 Nov 2024, 03:48
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2018/Sep/49 - Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2018/Sep/50 - Mailing List, Third Party Advisory | |
References | () https://www.sec-consult.com/en/blog/advisories/stored-cross-site-scripting-in-kendo-ui-editor-cve-2018-14037/ - Exploit, Technical Description, Third Party Advisory |
Information
Published : 2018-09-28 00:29
Updated : 2024-11-21 03:48
NVD link : CVE-2018-14037
Mitre link : CVE-2018-14037
CVE.ORG link : CVE-2018-14037
JSON object : View
Products Affected
progress
- kendo_ui
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')