CVE-2024-43369
📋 TL;DR
This vulnerability allows authenticated users with content editing permissions (typically Editor role or higher) to inject malicious scripts into RichText fields, leading to persistent cross-site scripting (XSS) attacks. The vulnerability exists because the validator only blocklisted 'javascript:' and 'vbscript:' protocols and was case-sensitive, allowing attackers to bypass protections using uppercase letters or other protocols. All Ibexa installations using affected versions of the RichText Field Type are vulnerable.
💻 Affected Systems
- Ibexa RichText Field Type
- Ibexa Platform
- eZ Platform
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers with editor privileges could inject malicious scripts that execute in other users' browsers, potentially stealing session cookies, performing actions as authenticated users, or delivering malware.
Likely Case
Authenticated attackers with content editing permissions inject XSS payloads that execute when other users view the compromised content, leading to session hijacking or credential theft.
If Mitigated
With proper role-based access controls limiting who can edit RichText content, the attack surface is reduced to trusted users only.
🎯 Exploit Status
Exploitation requires authenticated access with content editing permissions. The vulnerability is straightforward to exploit once an attacker has the required permissions.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.6.10
Vendor Advisory: https://developers.ibexa.co/security-advisories/ibexa-sa-2024-005-persistent-xss-in-richtext
Restart Required: Yes
Instructions:
1. Update to Ibexa version 4.6.10 or later. 2. Apply the patch from the vendor advisory. 3. Restart the application server. 4. Verify the fix by testing RichText field validation.
🧯 If You Can't Patch
- Restrict content editing permissions to only essential trusted users.
- Implement additional input validation at the application layer for RichText fields.
🔍 How to Verify
Check if Vulnerable:
Check if your Ibexa version is in the 4.6 branch and earlier than 4.6.10. Review if users with content editing permissions can inject scripts via RichText fields.
Check Version:
Check your Ibexa installation version via the admin interface or configuration files.
Verify Fix Applied:
After patching, test that RichText fields reject malicious link protocols (including uppercase variations) and only allow approved protocols.
📡 Detection & Monitoring
Log Indicators:
- Unusual content edits in RichText fields
- Multiple failed validation attempts on RichText input
- Suspicious link protocols in content submissions
Network Indicators:
- Unexpected outbound connections from user browsers after viewing content
- Suspicious JavaScript execution patterns
SIEM Query:
Search for patterns of content editing by users followed by unusual browser activity or external connections.
🔗 References
- https://developers.ibexa.co/security-advisories/ibexa-sa-2024-005-persistent-xss-in-richtext
- https://github.com/ezsystems/ezplatform-richtext/security/advisories/GHSA-rhm7-7469-rcpw
- https://github.com/ibexa/fieldtype-richtext/commit/0a3b830e8806d5169f697351fdc48ffd95a25c67
- https://github.com/ibexa/fieldtype-richtext/commit/59e9c1a9da60597f60cf7338bf289dccaa7e27ca
- https://github.com/ibexa/fieldtype-richtext/security/advisories/GHSA-hvcf-6324-cjh7