Headline
CVE-2023-25807: Merge pull request #4596 from dataease/pr@dev@refactor_xss-attack · dataease/dataease@cc94fb8
DataEase is an open source data visualization and analysis tool. When saving a dashboard on the DataEase platform saved data can be modified and store malicious code. This vulnerability can lead to the execution of malicious code stored by the attacker on the server side when the user accesses the dashboard. The vulnerability has been fixed in version 1.18.3.
@@ -18,7 +18,7 @@ @mousedown="handleMousedown" @blur="handleBlur" @input="handleInput" v-html="element.propValue" v-html="$xss(element.propValue)" /> <div v-if="!canEdit" @@ -28,7 +28,7 @@ @mousedown="handleMousedown" @blur="handleBlur" @input="handleInput" v-html="element.propValue" v-html="$xss(element.propValue)" /> </div> <div @@ -37,7 +37,7 @@ > <div :style="{ verticalAlign: element.style.verticalAlign }" v-html="textInfo" v-html="$xss(textInfo)" /> </div> </template> @@ -80,7 +80,7 @@ export default { }, textInfo() { if (this.element && this.element.hyperlinks && this.element.hyperlinks.enable) { return “<a title=’” + this.element.hyperlinks.content + “’ target=’” + this.element.hyperlinks.openMode + “’ href=’” + this.element.hyperlinks.content + “’>” + this.element.propValue + ‘</a>’ return ‘<a title=\’’ + this.element.hyperlinks.content + ‘\’ target=\’’ + this.element.hyperlinks.openMode + ‘\’ href=\’’ + this.element.hyperlinks.content + ‘\’>’ + this.element.propValue + ‘</a>’ } else { return this.element.propValue }