CVE-2024-34341

medium

Description

Trix is a rich text editor. The Trix editor, versions prior to 2.1.1, is vulnerable to arbitrary code execution when copying and pasting content from the web or other documents with markup into the editor. The vulnerability stems from improper sanitization of pasted content, allowing an attacker to embed malicious scripts which are executed within the context of the application. Users should upgrade to Trix editor version 2.1.1 or later, which incorporates proper sanitization of input from copied content.

References

https://github.com/basecamp/trix/security/advisories/GHSA-qjqp-xr96-cj99

https://github.com/basecamp/trix/releases/tag/v2.1.1

https://github.com/basecamp/trix/pull/1149

https://github.com/basecamp/trix/pull/1147

https://github.com/basecamp/trix/commit/841ff19b53f349915100bca8fcb488214ff93554

https://github.com/basecamp/trix/commit/1a5c68a14d48421fc368e30026f4a7918028b7ad

Details

Source: Mitre, NVD

Published: 2024-05-07

Updated: 2024-05-07

Risk Information

CVSS v2

Base Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 5.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

Severity: Medium