A cross-site scripting (XSS) vulnerability exists in fields/types/markdown/MarkdownType.js in KeystoneJS before 4.0.0-beta.7 via the Contact Us feature.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/keystonejs/keystone/pull/4478 | issue tracking third party advisory patch |
http://www.securityfocus.com/bid/101541 | vdb entry third party advisory |
https://www.exploit-db.com/exploits/43054/ | issue tracking patch exploit vdb entry third party advisory |
http://blog.securelayer7.net/keystonejs-open-source-penetration-testing-report/ | issue tracking third party advisory |
https://packetstormsecurity.com/files/144756/KeystoneJS-4.0.0-beta.5-Unauthenticated-Stored-Cross-Site-Scripting.html | issue tracking patch exploit vdb entry third party advisory |