A vulnerability in the HTML editor of Slab Quill 4.8.0 allows an attacker to execute arbitrary JavaScript by storing an XSS payload (a crafted onloadstart attribute of an IMG element) in a text field. Note: Researchers have claimed that this issue is not within the product itself, but is intended behavior in a web browser
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://quilljs.com | product |
https://burninatorsec.blogspot.com/2021/04/cve-2021-3163-xss-slab-quill-js.html | third party advisory exploit |
https://github.com/quilljs/quill/issues/3273 | issue tracking third party advisory broken link |
https://github.com/quilljs/quill/issues/3364 | issue tracking exploit third party advisory |