Lucene search

K
cveGitHub_MCVE-2021-29434
HistoryApr 19, 2021 - 7:15 p.m.

CVE-2021-29434

2021-04-1919:15:17
CWE-79
GitHub_M
web.nvd.nist.gov
68
4
wagtail
django
content management system
cve-2021-29434
security vulnerability
arbitrary code execution
nvd
patch
workaround

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N

AI Score

5.1

Confidence

High

EPSS

0.001

Percentile

19.4%

Wagtail is a Django content management system. In affected versions of Wagtail, when saving the contents of a rich text field in the admin interface, Wagtail does not apply server-side checks to ensure that link URLs use a valid protocol. A malicious user with access to the admin interface could thus craft a POST request to publish content with javascript: URLs containing arbitrary code. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin. See referenced GitHub advisory for additional details, including a workaround. Patched versions have been released as Wagtail 2.11.7 (for the LTS 2.11 branch) and Wagtail 2.12.4 (for the current 2.12 branch).

Affected configurations

Nvd
Vulners
Node
torchboxwagtailRange<2.11.6-
OR
torchboxwagtailRange2.11.02.11.7lts
OR
torchboxwagtailRange2.12.02.12.4
VendorProductVersionCPE
torchboxwagtail*cpe:2.3:a:torchbox:wagtail:*:*:*:*:-:*:*:*
torchboxwagtail*cpe:2.3:a:torchbox:wagtail:*:*:*:*:lts:*:*:*
torchboxwagtail*cpe:2.3:a:torchbox:wagtail:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "wagtail",
    "vendor": "wagtail",
    "versions": [
      {
        "status": "affected",
        "version": "<= 2.11.6"
      },
      {
        "status": "affected",
        "version": ">= 2.12, <= 2.12.3"
      }
    ]
  }
]

Social References

More

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N

AI Score

5.1

Confidence

High

EPSS

0.001

Percentile

19.4%

Related for CVE-2021-29434