Vulnerability Description
Ibexa RichText Field Type is a Field Type for supporting rich formatted text stored in a structured XML format. In versions on the 4.6 branch prior to 4.6.10, the validator for the RichText fieldtype blocklists `javascript:` and `vbscript:` in links to prevent XSS. This can leave other options open, and the check can be circumvented using upper case. Content editing permissions for RichText content is required to exploit this vulnerability, which typically means Editor role or higher. The fix implements an allowlist instead, which allows only approved link protocols. The new check is case insensitive. Version 4.6.10 contains a patch for this issue. No known workarounds are available.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://developers.ibexa.co/security-advisories/ibexa-sa-2024-005-persistent-xss
- https://github.com/ezsystems/ezplatform-richtext/security/advisories/GHSA-rhm7-7
- https://github.com/ibexa/fieldtype-richtext/commit/0a3b830e8806d5169f697351fdc48
- https://github.com/ibexa/fieldtype-richtext/commit/59e9c1a9da60597f60cf7338bf289
- https://github.com/ibexa/fieldtype-richtext/security/advisories/GHSA-hvcf-6324-c
FAQ
What is CVE-2024-43369?
CVE-2024-43369 is a vulnerability with a CVSS score of 7.2 (HIGH). Ibexa RichText Field Type is a Field Type for supporting rich formatted text stored in a structured XML format. In versions on the 4.6 branch prior to 4.6.10, the validator for the RichText fieldtype ...
How severe is CVE-2024-43369?
CVE-2024-43369 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-43369?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.