CVE-2021-3163

A vulnerability in the HTML editor of Slab Quill 4.8.0 allows an attacker to execute arbitrary JavaScript by storing an XSS payload (a crafted onloadstart attribute of an IMG element) in a text field. Note: Researchers have claimed that this issue is not within the product itself, but is intended behavior in a web browser
References
Link Resource
https://burninatorsec.blogspot.com/2021/04/cve-2021-3163-xss-slab-quill-js.html Exploit Third Party Advisory
https://github.com/quilljs/quill/issues/3273 Broken Link Issue Tracking Third Party Advisory
https://github.com/quilljs/quill/issues/3364 Exploit Issue Tracking Third Party Advisory
https://quilljs.com Product
Configurations

Configuration 1 (hide)

cpe:2.3:a:slab:quill:4.8.0:*:*:*:*:node.js:*:*

History

07 Nov 2023, 03:37

Type Values Removed Values Added
Summary ** DISPUTED ** A vulnerability in the HTML editor of Slab Quill 4.8.0 allows an attacker to execute arbitrary JavaScript by storing an XSS payload (a crafted onloadstart attribute of an IMG element) in a text field. Note: Researchers have claimed that this issue is not within the product itself, but is intended behavior in a web browser. A vulnerability in the HTML editor of Slab Quill 4.8.0 allows an attacker to execute arbitrary JavaScript by storing an XSS payload (a crafted onloadstart attribute of an IMG element) in a text field. Note: Researchers have claimed that this issue is not within the product itself, but is intended behavior in a web browser

Information

Published : 2021-04-12 21:15

Updated : 2024-08-03 17:15


NVD link : CVE-2021-3163

Mitre link : CVE-2021-3163

CVE.ORG link : CVE-2021-3163


JSON object : View

Products Affected

slab

  • quill
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')