All the vulnerabilites related to gristlabs - grist-core
cve-2024-56359
Vulnerability from cvelistv5
Published
2024-12-20 20:24
Modified
2024-12-20 20:24
Severity ?
EPSS score ?
Summary
grist-core is a spreadsheet hosting server. A user visiting a malicious document and clicking on a link in a HyperLink cell using a control modifier (meaning for example Ctrl+click) could have their account compromised, since the link could use the javascript: scheme and be evaluated in the context of their current page. This issue has been patched in version 1.3.2. Users are advised to upgrade. Users unable to upgrade should avoid clicking on HyperLink cell links using a control modifier in documents prepared by people they do not trust.
References
▼ | URL | Tags |
---|---|---|
https://github.com/gristlabs/grist-core/security/advisories/GHSA-qv69-5cj2-53r9 | x_refsource_CONFIRM | |
https://github.com/gristlabs/grist-core/commit/a792bdc43b456dbdd6fdc50d8747f4c349fab2f4 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | gristlabs | grist-core |
Version: < 1.3.2 |
|
{ "containers": { "cna": { "affected": [ { "product": "grist-core", "vendor": "gristlabs", "versions": [ { "status": "affected", "version": "\u003c 1.3.2" } ] } ], "descriptions": [ { "lang": "en", "value": "grist-core is a spreadsheet hosting server. A user visiting a malicious document and clicking on a link in a HyperLink cell using a control modifier (meaning for example Ctrl+click) could have their account compromised, since the link could use the javascript: scheme and be evaluated in the context of their current page. This issue has been patched in version 1.3.2. Users are advised to upgrade. Users unable to upgrade should avoid clicking on HyperLink cell links using a control modifier in documents prepared by people they do not trust." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-20T20:24:55.622Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/gristlabs/grist-core/security/advisories/GHSA-qv69-5cj2-53r9", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/gristlabs/grist-core/security/advisories/GHSA-qv69-5cj2-53r9" }, { "name": "https://github.com/gristlabs/grist-core/commit/a792bdc43b456dbdd6fdc50d8747f4c349fab2f4", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/gristlabs/grist-core/commit/a792bdc43b456dbdd6fdc50d8747f4c349fab2f4" } ], "source": { "advisory": "GHSA-qv69-5cj2-53r9", "discovery": "UNKNOWN" }, "title": "Cross-site Scripting vulnerability through HyperLink cells in grist-core" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-56359", "datePublished": "2024-12-20T20:24:55.622Z", "dateReserved": "2024-12-20T17:29:55.861Z", "dateUpdated": "2024-12-20T20:24:55.622Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-56357
Vulnerability from cvelistv5
Published
2024-12-20 20:24
Modified
2024-12-20 20:24
Severity ?
EPSS score ?
Summary
grist-core is a spreadsheet hosting server. A user visiting a malicious document or submitting a malicious form could have their account compromised, because it was possible to use the `javascript:` scheme with custom widget URLs and form redirect URLs. This issue has been patched in version 1.3.1. Users are advised to upgrade. Users unable to upgrade should avoid visiting documents or forms prepared by people they do not trust.
References
▼ | URL | Tags |
---|---|---|
https://github.com/gristlabs/grist-core/security/advisories/GHSA-cq5q-cqr7-vmf6 | x_refsource_CONFIRM | |
https://github.com/gristlabs/grist-core/commit/10b069005ec8d5f511e6554a56111d8f257f029e | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | gristlabs | grist-core |
Version: < 1.3.1 |
|
{ "containers": { "cna": { "affected": [ { "product": "grist-core", "vendor": "gristlabs", "versions": [ { "status": "affected", "version": "\u003c 1.3.1" } ] } ], "descriptions": [ { "lang": "en", "value": "grist-core is a spreadsheet hosting server. A user visiting a malicious document or submitting a malicious form could have their account compromised, because it was possible to use the `javascript:` scheme with custom widget URLs and form redirect URLs. This issue has been patched in version 1.3.1. Users are advised to upgrade. Users unable to upgrade should avoid visiting documents or forms prepared by people they do not trust." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-20T20:24:51.149Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/gristlabs/grist-core/security/advisories/GHSA-cq5q-cqr7-vmf6", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/gristlabs/grist-core/security/advisories/GHSA-cq5q-cqr7-vmf6" }, { "name": "https://github.com/gristlabs/grist-core/commit/10b069005ec8d5f511e6554a56111d8f257f029e", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/gristlabs/grist-core/commit/10b069005ec8d5f511e6554a56111d8f257f029e" } ], "source": { "advisory": "GHSA-cq5q-cqr7-vmf6", "discovery": "UNKNOWN" }, "title": "Cross-site Scripting vulnerability through custom widget URLs and form redirect URLs in grist-core" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-56357", "datePublished": "2024-12-20T20:24:51.149Z", "dateReserved": "2024-12-20T17:29:55.861Z", "dateUpdated": "2024-12-20T20:24:51.149Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-56358
Vulnerability from cvelistv5
Published
2024-12-20 20:24
Modified
2024-12-20 20:24
Severity ?
EPSS score ?
Summary
grist-core is a spreadsheet hosting server. A user visiting a malicious document and previewing an attachment could have their account compromised, because JavaScript in an SVG file would be evaluated in the context of their current page. This issue has been patched in version 1.3.2. Users are advised to upgrade. Users unable to upgrade should avoid previewing attachments in documents prepared by people they do not trust.
References
▼ | URL | Tags |
---|---|---|
https://github.com/gristlabs/grist-core/security/advisories/GHSA-jvfm-gf4f-33q3 | x_refsource_CONFIRM | |
https://github.com/gristlabs/grist-core/commit/a792bdc43b456dbdd6fdc50d8747f4c349fab2f4 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | gristlabs | grist-core |
Version: < 1.3.2 |
|
{ "containers": { "cna": { "affected": [ { "product": "grist-core", "vendor": "gristlabs", "versions": [ { "status": "affected", "version": "\u003c 1.3.2" } ] } ], "descriptions": [ { "lang": "en", "value": "grist-core is a spreadsheet hosting server. A user visiting a malicious document and previewing an attachment could have their account compromised, because JavaScript in an SVG file would be evaluated in the context of their current page. This issue has been patched in version 1.3.2. Users are advised to upgrade. Users unable to upgrade should avoid previewing attachments in documents prepared by people they do not trust." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-20T20:24:53.932Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/gristlabs/grist-core/security/advisories/GHSA-jvfm-gf4f-33q3", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/gristlabs/grist-core/security/advisories/GHSA-jvfm-gf4f-33q3" }, { "name": "https://github.com/gristlabs/grist-core/commit/a792bdc43b456dbdd6fdc50d8747f4c349fab2f4", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/gristlabs/grist-core/commit/a792bdc43b456dbdd6fdc50d8747f4c349fab2f4" } ], "source": { "advisory": "GHSA-jvfm-gf4f-33q3", "discovery": "UNKNOWN" }, "title": "Cross-site Scripting vulnerability through svg attachment previews in grist-core" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-56358", "datePublished": "2024-12-20T20:24:53.932Z", "dateReserved": "2024-12-20T17:29:55.861Z", "dateUpdated": "2024-12-20T20:24:53.932Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }