Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:tiny:tinymce:*:*:*:*:*:*:*:*", "matchCriteriaId": "40FAA5E8-663B-4236-981C-69A5F03221EB", "versionEndExcluding": "5.10.7", "vulnerable": true}, {"criteria": "cpe:2.3:a:tiny:tinymce:*:*:*:*:*:*:*:*", "matchCriteriaId": "246A9A9B-C507-4BFE-B118-EFC4EEFAF4AA", "versionEndExcluding": "6.3.1", "versionStartIncluding": "6.0.0", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "tinymce is an open source rich text editor. A cross-site scripting (XSS) vulnerability was discovered in the alert and confirm dialogs when these dialogs were provided with malicious HTML content. This can occur in plugins that use the alert or confirm dialogs, such as in the `image` plugin, which presents these dialogs when certain errors occur. The vulnerability allowed arbitrary JavaScript execution when an alert presented in the TinyMCE UI for the current user. This vulnerability has been patched in TinyMCE 5.10.7 and TinyMCE 6.3.1 by ensuring HTML sanitization was still performed after unwrapping invalid elements. Users are advised to upgrade to either 5.10.7 or 6.3.1. Users unable to upgrade may ensure the the `images_upload_handler` returns a valid value as per the images_upload_handler documentation."}, {"lang": "es", "value": "tinymce es un editor de texto enriquecido de c\u00f3digo abierto. Se descubri\u00f3 una vulnerabilidad de Cross-Site Scripting (XSS) en los cuadros de di\u00e1logo de alerta y confirmaci\u00f3n cuando estos cuadros de di\u00e1logo conten\u00edan contenido HTML malicioso. Esto puede ocurrir en complementos que utilizan cuadros de di\u00e1logo de alerta o confirmaci\u00f3n, como en el complemento \"image\", que presenta estos cuadros de di\u00e1logo cuando ocurren ciertos errores. La vulnerabilidad permit\u00eda la ejecuci\u00f3n arbitraria de JavaScript cuando se presentaba una alerta en la interfaz de usuario de TinyMCE para el usuario actual. Esta vulnerabilidad se parch\u00f3 en TinyMCE 5.10.7 y TinyMCE 6.3.1 asegurando que a\u00fan se realizara la sanitizaci\u00f3n de HTML despu\u00e9s de desempaquetar elementos no v\u00e1lidos. Se recomienda a los usuarios que actualicen a 5.10.7 o 6.3.1. Los usuarios que no puedan actualizar pueden asegurarse de que `images_upload_handler` devuelva un valor v\u00e1lido seg\u00fan la documentaci\u00f3n de images_upload_handler."}], "id": "CVE-2022-23494", "lastModified": "2024-11-21T06:48:40.730", "metrics": {"cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1"}, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "security-advisories@github.com", "type": "Secondary"}, {"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2022-12-08T22:15:10.150", "references": [{"source": "security-advisories@github.com", "tags": ["Patch", "Third Party Advisory"], "url": "https://github.com/tinymce/tinymce/commit/6923d85eba6de3e08ebc9c5a387b5abdaa21150e"}, {"source": "security-advisories@github.com", "tags": ["Patch", "Third Party Advisory"], "url": "https://github.com/tinymce/tinymce/commit/8bb2d2646d4e1a718fce61a775fa22e9d317b32d"}, {"source": "security-advisories@github.com", "tags": ["Patch", "Third Party Advisory"], "url": "https://github.com/tinymce/tinymce/security/advisories/GHSA-gg8r-xjwq-4w92"}, {"source": "security-advisories@github.com", "tags": ["Release Notes", "Vendor Advisory"], "url": "https://www.tiny.cloud/docs/release-notes/release-notes5107/#securityfixes"}, {"source": "security-advisories@github.com", "tags": ["Release Notes", "Vendor Advisory"], "url": "https://www.tiny.cloud/docs/tinymce/6/6.3-release-notes/#security-fixes"}, {"source": "security-advisories@github.com", "tags": ["Vendor Advisory"], "url": "https://www.tiny.cloud/docs/tinymce/6/file-image-upload/#images_upload_handler"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Third Party Advisory"], "url": "https://github.com/tinymce/tinymce/commit/6923d85eba6de3e08ebc9c5a387b5abdaa21150e"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Third Party Advisory"], "url": "https://github.com/tinymce/tinymce/commit/8bb2d2646d4e1a718fce61a775fa22e9d317b32d"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Third Party Advisory"], "url": "https://github.com/tinymce/tinymce/security/advisories/GHSA-gg8r-xjwq-4w92"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Release Notes", "Vendor Advisory"], "url": "https://www.tiny.cloud/docs/release-notes/release-notes5107/#securityfixes"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Release Notes", "Vendor Advisory"], "url": "https://www.tiny.cloud/docs/tinymce/6/6.3-release-notes/#security-fixes"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://www.tiny.cloud/docs/tinymce/6/file-image-upload/#images_upload_handler"}], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-79"}], "source": "security-advisories@github.com", "type": "Secondary"}]}