[Security-news] Typogrify - Moderately critical - Cross Site Scripting - SA-CONTRIB-2024-002

security-news at drupal.org security-news at drupal.org
Wed Jan 10 18:38:22 UTC 2024


View online: https://www.drupal.org/sa-contrib-2024-002

Project: Typogrify [1]
Date: 2024-January-10
Security risk: *Moderately critical* 12∕25
AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:Uncommon [2]
Vulnerability: Cross Site Scripting

Affected versions: <1.3.0
Description: 
The Typogrify module brings the typographic refinements of Typogrify to
Drupal. It provides a text filter and a Twig filter.

The typogrify Twig filter can be used to bypass the Twig auto-escape feature,
leading to a persistent Cross Site Scripting (XSS) vulnerability.

This vulnerability is mitigated by the fact that it is only exposed when the
twig filter is specifically used in a template to render content.

Solution: 
Install the latest version:

   * If you use the Typogrify module for Drupal 10.x, upgrade to Typogrify
     8.x-1.3 [3]

If you use the typogrify Twig filter provided by this module, then this
update may cause double-encoding of text. See the updated README for best
practices.

Reported By: 
   * Pierre Rudloff [4]

Fixed By: 
   * Benji Fisher [5] of the Drupal Security Team

Coordinated By: 
   * Damien McKenna [6] of the Drupal Security Team
   * Greg Knaddison [7] of the Drupal Security Team


[1] https://www.drupal.org/project/typogrify
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/typogrify/releases/8.x-1.3
[4] https://www.drupal.org/user/3611858
[5] https://www.drupal.org/user/683300
[6] https://www.drupal.org/user/108450
[7] https://www.drupal.org/user/36762



More information about the Security-news mailing list