Home

Description

grist-core is a spreadsheet hosting server. A user visiting a malicious document and clicking on a link in a HyperLink cell using a control modifier (meaning for example Ctrl+click) could have their account compromised, since the link could use the javascript: scheme and be evaluated in the context of their current page. This issue has been patched in version 1.3.2. Users are advised to upgrade. Users unable to upgrade should avoid clicking on HyperLink cell links using a control modifier in documents prepared by people they do not trust.

PUBLISHED Reserved 2024-12-20 | Published 2024-12-20 | Updated 2024-12-24 | Assigner GitHub_M




HIGH: 8.1CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

< 1.3.2
affected

References

github.com/...t-core/security/advisories/GHSA-qv69-5cj2-53r9

github.com/...ommit/a792bdc43b456dbdd6fdc50d8747f4c349fab2f4

cve.org (CVE-2024-56359)

nvd.nist.gov (CVE-2024-56359)

Download JSON