First published: Tue Nov 03 2020(Updated: )
In BookStack before version 0.30.4, a user with permissions to edit a page could insert JavaScript code through the use of `javascript:` URIs within a link or form which would run, within the context of the current page, when clicked or submitted. Additionally, a user with permissions to edit a page could insert a particular meta tag which could be used to silently redirect users to a alternative location upon visit of a page. Dangerous content may remain in the database but will be removed before being displayed on a page. If you think this could have been exploited the linked advisory provides a SQL query to test. As a workaround without upgrading, page edit permissions could be limited to only those that are trusted until you can upgrade although this will not address existing exploitation of this vulnerability. The issue is fixed in BookStack version 0.30.4.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bookstackapp Bookstack | <0.30.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-26211 is a vulnerability in BookStack before version 0.30.4 that allows a user with permissions to edit a page to insert JavaScript code through the use of `javascript:` URIs within a link or form.
CVE-2020-26211 allows an attacker with permissions to edit a page in BookStack to insert JavaScript code using `javascript:` URIs in links or forms, which will then run within the context of the current page when clicked or submitted.
CVE-2020-26211 has a severity rating of 8.7 (high).
The affected software of CVE-2020-26211 is BookStack before version 0.30.4.
To fix CVE-2020-26211, users should update to version 0.30.4 or newer of BookStack.