Cross-site scripting (XSS) vulnerability in Progress Kendo UI Editor v2018.1.221 allows remote attackers to inject arbitrary JavaScript into the DOM of the WYSIWYG editor because of the editorNS.Serializer toEditableHtml function in kendo.all.min.js. If the victim accesses the editor, the payload gets executed. Furthermore, if the payload is reflected at any other resource that does rely on the sanitisation of the editor itself, the JavaScript payload will be executed in the context of the application. This allows attackers (in the worst case) to take over user sessions.
References
Link Resource
http://seclists.org/fulldisclosure/2018/Sep/49 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2018/Sep/50 Mailing List Third Party Advisory
https://www.sec-consult.com/en/blog/advisories/stored-cross-site-scripting-in-kendo-ui-editor-cve-2018-14037/ Exploit Technical Description Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2018-09-28T00:00:00

Updated: 2018-09-27T23:57:01

Reserved: 2018-07-13T00:00:00


Link: CVE-2018-14037

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2018-09-28T00:29:00.773

Modified: 2019-08-01T12:14:45.923


Link: CVE-2018-14037

JSON object: View

cve-icon Redhat Information

No data.

CWE