Miggo Logo

CVE-2017-6589: EpicEditor XSS Vulnerability

6.1

CVSS Score
3.0

Basic Information

EPSS Score
0.52755%
Published
5/17/2022
Updated
10/31/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
epiceditornpm<= 0.2.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from EpicEditor's insecure default marked.js configuration where sanitization is disabled (sanitize: false). This configuration is explicitly shown in third-party analysis and matches the XSS vector description. While the exact function name/path isn't specified in available resources, the root cause is clearly the marked.js options initialization logic in EpicEditor's codebase that fails to enable sanitization by default.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*pi***itor t*rou** *.*.* **s *ross-Sit* S*riptin* ****us* o* *n ins**ur* ****ult m*rk**.js *on*i*ur*tion. *n *x*mpl* *tt**k v**tor is * *r**t** IM* *l*m*nt in *n *TML *o*um*nt.

Reasoning

T** vuln*r**ility st*ms *rom *pi***itor's ins**ur* ****ult `m*rk**.js` *on*i*ur*tion w**r* s*nitiz*tion is *is**l** (s*nitiz*: **ls*). T*is *on*i*ur*tion is *xpli*itly s*own in t*ir*-p*rty *n*lysis *n* m*t***s t** XSS v**tor **s*ription. W*il* t** *x