[Security-news] Typogrify - Moderately critical - Cross Site Scripting - SA-CONTRIB-2024-002
security-news at drupal.org
security-news at drupal.org
Wed Jan 10 18:38:22 UTC 2024
View online: https://www.drupal.org/sa-contrib-2024-002
Project: Typogrify [1]
Date: 2024-January-10
Security risk: *Moderately critical* 12∕25
AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:Uncommon [2]
Vulnerability: Cross Site Scripting
Affected versions: <1.3.0
Description:
The Typogrify module brings the typographic refinements of Typogrify to
Drupal. It provides a text filter and a Twig filter.
The typogrify Twig filter can be used to bypass the Twig auto-escape feature,
leading to a persistent Cross Site Scripting (XSS) vulnerability.
This vulnerability is mitigated by the fact that it is only exposed when the
twig filter is specifically used in a template to render content.
Solution:
Install the latest version:
* If you use the Typogrify module for Drupal 10.x, upgrade to Typogrify
8.x-1.3 [3]
If you use the typogrify Twig filter provided by this module, then this
update may cause double-encoding of text. See the updated README for best
practices.
Reported By:
* Pierre Rudloff [4]
Fixed By:
* Benji Fisher [5] of the Drupal Security Team
Coordinated By:
* Damien McKenna [6] of the Drupal Security Team
* Greg Knaddison [7] of the Drupal Security Team
[1] https://www.drupal.org/project/typogrify
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/typogrify/releases/8.x-1.3
[4] https://www.drupal.org/user/3611858
[5] https://www.drupal.org/user/683300
[6] https://www.drupal.org/user/108450
[7] https://www.drupal.org/user/36762
More information about the Security-news
mailing list