A vulnerability in the HTML editor of Slab Quill 4.8.0 allows an attacker to execute arbitrary JavaScript by storing an XSS payload (a crafted onloadstart attribute of an IMG element) in a text field. Note: Researchers have claimed that this issue is not within the product itself, but is intended behavior in a web browser
References
Link | Resource |
---|---|
https://burninatorsec.blogspot.com/2021/04/cve-2021-3163-xss-slab-quill-js.html | Exploit Third Party Advisory |
https://github.com/quilljs/quill/issues/3273 | Broken Link Issue Tracking Third Party Advisory |
https://github.com/quilljs/quill/issues/3364 | Exploit Issue Tracking Third Party Advisory |
https://quilljs.com | Product |
Configurations
History
07 Nov 2023, 03:37
Type | Values Removed | Values Added |
---|---|---|
Summary | A vulnerability in the HTML editor of Slab Quill 4.8.0 allows an attacker to execute arbitrary JavaScript by storing an XSS payload (a crafted onloadstart attribute of an IMG element) in a text field. Note: Researchers have claimed that this issue is not within the product itself, but is intended behavior in a web browser |
Information
Published : 2021-04-12 21:15
Updated : 2024-08-03 17:15
NVD link : CVE-2021-3163
Mitre link : CVE-2021-3163
CVE.ORG link : CVE-2021-3163
JSON object : View
Products Affected
slab
- quill
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')