Summary
An XSS vulnerability allows authorized users to execute arbitrary JavaScript via the file preview function.
Impact
Users can upload HTML/CSS/JS files into the Xibo Library via the Generic File module to be referenced on Displays and in Layouts. This is intended functionality. When previewing these resources from the Library and Layout editor they are executed in the users browser.
This will be disabled in future releases, and users are encouraged to use the new developer tools in 4.1 to design their widgets which require this type of functionality.
Patches
This behaviour has been changed in 4.1.0 to preview previewing of generic files.
Workarounds
There are no workarounds for this issue.
References
Reporter ref: K-Xibo-2024-006 Xibo CMS Cross Site Scripting
Acknowledgements
The vulnerability was discovered by Sergey Bobrov (Kaspersky, https://kaspersky.com/)
https://github.com/BlackFan
Summary
An XSS vulnerability allows authorized users to execute arbitrary JavaScript via the file preview function.
Impact
Users can upload HTML/CSS/JS files into the Xibo Library via the Generic File module to be referenced on Displays and in Layouts. This is intended functionality. When previewing these resources from the Library and Layout editor they are executed in the users browser.
This will be disabled in future releases, and users are encouraged to use the new developer tools in 4.1 to design their widgets which require this type of functionality.
Patches
This behaviour has been changed in 4.1.0 to preview previewing of generic files.
Workarounds
There are no workarounds for this issue.
References
Reporter ref: K-Xibo-2024-006 Xibo CMS Cross Site Scripting
Acknowledgements
The vulnerability was discovered by Sergey Bobrov (Kaspersky, https://kaspersky.com/)
https://github.com/BlackFan