Description
The Trix editor, versions prior to 2.1.1, is vulnerable to arbitrary code execution when copying and pasting content from the web or other documents with markup into the editor.
Recommendation
Update the trix package to the latest compatible version. Followings are version details:
Affected version(s): **>= 0.9.0, < 1.3.2 >= 2.0.0, < 2.1.1** Patched version(s): **1.3.2 2.1.1**
References
- GHSA-qjqp-xr96-cj99
- discuss.rubyonrails.org
- rubyonrails.org
- CVE-2024-34341
- CWE-79
- CAPEC-310
- OWASP 2021-A3
- OWASP 2021-A6
Related Issues
- JSONPath Plus Remote Code Execution (RCE) Vulnerability - CVE-2024-21534
- Arbitrary Code Execution in mathjs - CVE-2017-1001003
- XSS vulnerability allowing arbitrary JavaScript execution - CVE-2021-41174
- Arbitrary code execution in djv - CVE-2020-28464
- Tags:
- npm
- trix
Anything's wrong? Let us know Last updated on June 03, 2024