2017-02-07 Instructure Advisory IAC20604 - MathML Stored XSS
- Subscribe to RSS Feed
- Mark as New
- Mark as Read
- Bookmark
- Subscribe
- Printer Friendly Page
- Report Inappropriate Content
SECURITY UPDATE |
| Release Date: | 2017-02-07 |
| Description: | MathML Stored XSS |
| Criticality Level: | Moderately Critical |
| Impact: | Cross Site Scripting / Potential Exposure of Sensitive Data |
| Systems Affected: | Canvas LMS |
| Solution Status: | Patched |
| Discovered By: | Fyoorer, as part of a bugcrowd audit |
| Relevant Changesets: | prevent storing scripts in mathml href tags · instructure/canvas-lms@5f3a8938c6 · GitHub |
Summary:
An external security audit discovered a misconfigured whitelist for protocols allowed in href attributes for MathML tags (<math href=”...”>). This allowed a potential attacker to run javascript when a mathml tag was clicked in Safari or Firefox, where MathML is supported.
Status:
All systems were patched as of 11:01 MT on 2/7/2017
