-
Notifications
You must be signed in to change notification settings - Fork 220
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Browse files
Browse the repository at this point in the history
* DOC-2457: TinyMCE 6.8.4 Security Patch. * Update modules/ROOT/pages/6.8.4-release-notes.adoc
- Loading branch information
1 parent
96d3dd5
commit 880087b
Showing
4 changed files
with
60 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,45 @@ | ||
= TinyMCE {release-version} | ||
:release-version: 6.8.4 | ||
:navtitle: TinyMCE {release-version} | ||
:description: Release notes for TinyMCE {release-version} | ||
:keywords: releasenotes, new, changes, bugfixes | ||
:page-toclevels: 1 | ||
|
||
include::partial$misc/admon-releasenotes-for-stable.adoc[] | ||
|
||
[[overview]] | ||
== Overview | ||
|
||
{productname} {release-version} was released for {enterpriseversion} and {cloudname} on Wednesday, June 19^th^, 2024. These release notes provide an overview of the changes for {productname} {release-version}, including: | ||
|
||
* xref:security-fixes[Security fixes] | ||
|
||
|
||
[[security-fixes]] | ||
== Security fixes | ||
|
||
{productname} 6.8.4 includes two fixes for the following security issues: | ||
|
||
=== HTML entities that were double decoded in `noscript` elements caused an XSS vulnerability. | ||
// #TINY-11019 | ||
|
||
A https://owasp.org/www-community/attacks/xss/[cross-site scripting] (XSS) vulnerability was discovered in {productname}'s content parsing code. This allowed specially crafted `noscript` elements containing malicious code to be executed when that content was loaded into the editor. | ||
|
||
This vulnerability has been patched in {productname} 7.2.0, {productname} {release-version} and {productname} 5.11.0 LTS by ensuring that content within `noscript` elements are properly parsed. | ||
|
||
GHSA: link:https://github.com/tinymce/tinymce/security/advisories/GHSA-w9jx-4g6g-rp7x[GitHub Advisory]. | ||
|
||
CVE: Pending. | ||
|
||
NOTE: Tiny Technologies would like to thank link:https://malavkhatri.com/[Malav Khatri (devilbugbounty)] and another reporter for discovering this vulnerability. | ||
|
||
=== It was possible to inject XSS HTML that was not matching the regexp when using the `noneditable_regexp` option. | ||
// #TINY-11022 | ||
|
||
A https://owasp.org/www-community/attacks/xss/[cross-site scripting] (XSS) vulnerability was discovered in {productname}'s content extraction code. When using the `noneditable_regexp` option, specially crafted HTML attributes containing malicious code were able to be executed when content was extracted from the editor. | ||
|
||
This vulnerability has been patched in {productname} 7.2.0, {productname} {release-version} and {productname} 5.11.0 LTS by ensuring that, when using the `noneditable_regexp` option, any content within an attribute is properly verified to match the configured regular expression before being added. | ||
|
||
GHSA: link:https://github.com/tinymce/tinymce/security/advisories/GHSA-9hcv-j9pv-qmph[GitHub Advisory]. | ||
|
||
CVE: Pending. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters