Description
The Trix editor, versions prior to 2.1.1, is vulnerable to arbitrary code execution when copying and pasting content from the web or other documents with markup into the editor.
Recommendation
Update the trix package to the latest compatible version. Followings are version details:
Affected version(s): **>= 0.9.0, < 1.3.2 >= 2.0.0, < 2.1.1** Patched version(s): **1.3.2 2.1.1**
References
- GHSA-qjqp-xr96-cj99
- discuss.rubyonrails.org
- rubyonrails.org
- CVE-2024-34341
- CWE-79
- CAPEC-310
- OWASP 2021-A3
- OWASP 2021-A6
Related Issues
- JSONPath Plus Remote Code Execution (RCE) Vulnerability - CVE-2024-21534
- PDF.js vulnerable to arbitrary JavaScript execution upon opening a malicious PDF - CVE-2024-4367
- MailDev Remote Code Execution - CVE-2024-27448
- Arbitrary Code Execution in mathjs (GHSA-vx5c-87qx-cv6c) - CVE-2017-1001002
- Tags:
- npm
- trix
Anything's wrong? Let us know Last updated on June 03, 2024