Silverstripe uses TinyMCE which allows svg files linked in object tags
Moderate severity
GitHub Reviewed
Published
Jul 17, 2024
in
silverstripe/silverstripe-framework
•
Updated Aug 1, 2024
Description
Published to the GitHub Advisory Database
Jul 17, 2024
Reviewed
Jul 17, 2024
Last updated
Aug 1, 2024
Impact
TinyMCE v6 has a configuration value
convert_unsafe_embeds
set tofalse
which allows svg files containing javascript to be used in<object>
or<embed>
tags, which can be used as a vector for XSS attacks.Note that
<embed>
tags are not allowed by default.After patching the default value of
convert_unsafe_embeds
will be set totrue
. This means that<object>
tags will be converted to iframes instead the next time the page is saved, which may break any pages that rely upon previously saved<object>
tags. Developers can override this configuration if desired to revert to the original behaviour.We reviewed the potential impact of this vulnerability within the context of Silverstripe CMS. We concluded this is a medium impact vulnerability given how TinyMCE is used by Silverstripe CMS.
References:
References