CVE-2024-26148
CVSS V2 None
CVSS V3 None
Description
Querybook is a user interface for querying big data. Prior to version 3.31.1, there is a vulnerability in Querybook's rich text editor that enables users to input arbitrary URLs without undergoing necessary validation. This particular security flaw allows the use of `javascript:` protocol which can potentially trigger arbitrary client-side execution. The most extreme exploit of this flaw could occur when an admin user unknowingly clicks on a cross-site scripting URL, thereby unintentionally compromising admin role access to the attacker. A patch to rectify this issue has been introduced in Querybook version `3.31.1`. The fix is backward compatible and automatically fixes existing DataDocs. There are no known workarounds for this issue, except for manually checking each URL prior to clicking on them.
Overview
- CVE ID
- CVE-2024-26148
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-02-21T22:35:17.041Z
- Last Modified Date
- 2024-02-21T22:35:17.041Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/pinterest/querybook/security/advisories/GHSA-fh6g-gvvp-587f | x_refsource_CONFIRM |
https://github.com/pinterest/querybook/pull/1412 | x_refsource_MISC |
https://github.com/pinterest/querybook/commit/bc620dabaaf13ff1dcb30af0b46a490403fb9908 | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-26148 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26148 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-26 00:49:26 | Added to TrackCVE |