mirror of
https://github.com/wagtail/wagtail.git
synced 2024-11-28 17:13:31 +01:00
19 lines
885 B
ReStructuredText
19 lines
885 B
ReStructuredText
|
============================
|
||
|
Wagtail 2.11.7 release notes
|
||
|
============================
|
||
|
|
||
|
.. contents::
|
||
|
:local:
|
||
|
:depth: 1
|
||
|
|
||
|
|
||
|
What's new
|
||
|
==========
|
||
|
|
||
|
CVE-2021-29434: Improper validation of URLs ('Cross-site Scripting') in rich text fields
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
|
||
|
This release addresses a cross-site scripting (XSS) vulnerability in rich text fields. When saving the contents of a rich text field in the admin interface, Wagtail did not apply server-side checks to ensure that link URLs use a valid protocol. A malicious user with access to the admin interface could thus craft a POST request to publish content with javascript: URLs containing arbitrary code. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin.
|
||
|
|
||
|
Many thanks to Kevin Breen for reporting this issue.
|