CVE-2024-56359

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-56359
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-56359.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-56359
Aliases
  • GHSA-qv69-5cj2-53r9
Published
2024-12-20T21:15:10Z
Modified
2025-01-08T16:27:13.760341Z
Summary
[none]
Details

grist-core is a spreadsheet hosting server. A user visiting a malicious document and clicking on a link in a HyperLink cell using a control modifier (meaning for example Ctrl+click) could have their account compromised, since the link could use the javascript: scheme and be evaluated in the context of their current page. This issue has been patched in version 1.3.2. Users are advised to upgrade. Users unable to upgrade should avoid clicking on HyperLink cell links using a control modifier in documents prepared by people they do not trust.

References

Affected packages

Git / github.com/gristlabs/grist-core

Affected ranges

Type
GIT
Repo
https://github.com/gristlabs/grist-core
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*

1.3.1

v0.*

v0.7.1
v0.7.2
v0.7.3
v0.7.4
v0.7.5
v0.7.6
v0.7.7
v0.7.8
v0.7.9

v1.*

v1.0.3
v1.0.4
v1.0.5
v1.0.6
v1.0.7
v1.0.8
v1.0.9
v1.1.0
v1.1.1
v1.1.10
v1.1.11
v1.1.12
v1.1.13
v1.1.14
v1.1.15
v1.1.16
v1.1.17
v1.1.18
v1.1.2
v1.1.3
v1.1.4
v1.1.5
v1.1.6
v1.1.7
v1.1.8
v1.1.9
v1.2.0
v1.2.1
v1.3.0
v1.3.1