Vulnerability Change Records for CVE-2024-26148
Change History
New CVE Received from GitHub, Inc. 2/21/2024 6:15:08 PM
Action |
Type |
Old Value |
New Value |
Added |
Description |
|
Querybook is a user interface for querying big data. Prior to version 3.31.1, there is a vulnerability in Querybook's rich text editor that enables users to input arbitrary URLs without undergoing necessary validation. This particular security flaw allows the use of `javascript:` protocol which can potentially trigger arbitrary client-side execution. The most extreme exploit of this flaw could occur when an admin user unknowingly clicks on a cross-site scripting URL, thereby unintentionally compromising admin role access to the attacker. A patch to rectify this issue has been introduced in Querybook version `3.31.1`. The fix is backward compatible and automatically fixes existing DataDocs. There are no known workarounds for this issue, except for manually checking each URL prior to clicking on them.
|
Added |
CVSS V3.1 |
|
GitHub, Inc. AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
Added |
CWE |
|
GitHub, Inc. CWE-79
|
Added |
Reference |
|
GitHub, Inc. https://github.com/pinterest/querybook/commit/bc620dabaaf13ff1dcb30af0b46a490403fb9908 [No types assigned]
|
Added |
Reference |
|
GitHub, Inc. https://github.com/pinterest/querybook/pull/1412 [No types assigned]
|
Added |
Reference |
|
GitHub, Inc. https://github.com/pinterest/querybook/security/advisories/GHSA-fh6g-gvvp-587f [No types assigned]
|
|