Description
In Dijit before versions 1.11.11, and greater than or equal to 1.12.0 and less than 1.12.9, and greater than or equal to 1.13.0 and less than 1.13.8, and greater than or equal to 1.14.0 and less than 1.14.7, and greater than or equal to 1.15.0 and less than 1.15.4, and greater than or equal to 1.16.0 and less than 1.16.3, there is a cross-site scripting vulnerability in the Editor's LinkDialog plugin. This has been fixed in 1.11.11, 1.12.9, 1.13.8, 1.14.7, 1.15.4, 1.16.3.
Remediation
References
https://github.com/dojo/dijit/commit/462bdcd60d0333315fe69ab4709c894d78f61301
https://github.com/dojo/dijit/security/advisories/GHSA-cxjc-r2fp-7mq6
https://www.oracle.com/security-alerts/cpuoct2020.html
https://security.netapp.com/advisory/ntap-20201023-0003/
https://lists.debian.org/debian-lts-announce/2023/01/msg00030.html
Related Vulnerabilities
CVE-2018-11307 Vulnerability in maven package com.fasterxml.jackson.core:jackson-databind
CVE-2012-0881 Vulnerability in maven package xerces:xercesimpl
CVE-2021-25987 Vulnerability in npm package hexo
CVE-2013-4152 Vulnerability in maven package org.springframework:spring-web
CVE-2014-4172 Vulnerability in maven package org.jasig.cas:cas-client-core