Silverstripe uses TinyMCE which allows svg files linked in object tags
Moderate severity
GitHub Reviewed
Published
Jul 17, 2024
in
silverstripe/silverstripe-framework
•
Updated Aug 1, 2024
Description
Published to the GitHub Advisory Database
Jul 17, 2024
Reviewed
Jul 17, 2024
Last updated
Aug 1, 2024
Impact
TinyMCE v6 has a configuration value
convert_unsafe_embedsset tofalsewhich allows svg files containing javascript to be used in<object>or<embed>tags, which can be used as a vector for XSS attacks.Note that
<embed>tags are not allowed by default.After patching the default value of
convert_unsafe_embedswill be set totrue. This means that<object>tags will be converted to iframes instead the next time the page is saved, which may break any pages that rely upon previously saved<object>tags. Developers can override this configuration if desired to revert to the original behaviour.We reviewed the potential impact of this vulnerability within the context of Silverstripe CMS. We concluded this is a medium impact vulnerability given how TinyMCE is used by Silverstripe CMS.
References:
References