View online: https://www.drupal.org/sa-contrib-2024-002
Project: Typogrify [1] Date: 2024-January-10 Security risk: *Moderately critical* 12∕25 AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:Uncommon [2] Vulnerability: Cross Site Scripting
Affected versions: <1.3.0 Description: The Typogrify module brings the typographic refinements of Typogrify to Drupal. It provides a text filter and a Twig filter.
The typogrify Twig filter can be used to bypass the Twig auto-escape feature, leading to a persistent Cross Site Scripting (XSS) vulnerability.
This vulnerability is mitigated by the fact that it is only exposed when the twig filter is specifically used in a template to render content.
Solution: Install the latest version:
* If you use the Typogrify module for Drupal 10.x, upgrade to Typogrify 8.x-1.3 [3]
If you use the typogrify Twig filter provided by this module, then this update may cause double-encoding of text. See the updated README for best practices.
Reported By: * Pierre Rudloff [4]
Fixed By: * Benji Fisher [5] of the Drupal Security Team
Coordinated By: * Damien McKenna [6] of the Drupal Security Team * Greg Knaddison [7] of the Drupal Security Team
[1] https://www.drupal.org/project/typogrify [2] https://www.drupal.org/security-team/risk-levels [3] https://www.drupal.org/project/typogrify/releases/8.x-1.3 [4] https://www.drupal.org/user/3611858 [5] https://www.drupal.org/user/683300 [6] https://www.drupal.org/user/108450 [7] https://www.drupal.org/user/36762