First published: Fri Sep 28 2018(Updated: )
Cross-site scripting (XSS) vulnerability in Progress Kendo UI Editor v2018.1.221 allows remote attackers to inject arbitrary JavaScript into the DOM of the WYSIWYG editor because of the editorNS.Serializer toEditableHtml function in kendo.all.min.js. If the victim accesses the editor, the payload gets executed. Furthermore, if the payload is reflected at any other resource that does rely on the sanitisation of the editor itself, the JavaScript payload will be executed in the context of the application. This allows attackers (in the worst case) to take over user sessions.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Progress Kendo UI | =2018.1.221 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-14037 is classified as a medium severity vulnerability due to its potential for cross-site scripting attacks.
To fix CVE-2018-14037, upgrade to a later version of Progress Kendo UI that has addressed the cross-site scripting vulnerability.
CVE-2018-14037 affects Progress Kendo UI version 2018.1.221.
CVE-2018-14037 can facilitate remote attackers injecting arbitrary JavaScript into the DOM of the Kendo UI Editor.
The vulnerability is related to the editorNS.Serializer toEditableHtml function in kendo.all.min.js.