-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Apple Safari WebKit Selections Use-After-Free Vulnerability in tui-editor-Editor-full.js #1625
Comments
@ebicoglu |
This was in a WebKit. Good security team. If those kids could read they'd be very upset. |
@davidskuza |
You also do not understand what you read. The reported bug (CVE) is a bug in WebKit's HTTP response parser. This has nothing even to do with JavaScript. You cannot access or modify WebKit's parser from JS. You cannot trigger it from frontend (maybe today with web services, idk). It's not tui.editor bug, it was WebKit's. This company has missconfigured their software which detects JS, frontend code as a bug in WebKit's HTTP response parser from 2010... If this would be a bug in tui.editor that would mean every developer could craft such JS code to take over your device which is obviously not the case. I guess tui.editor has some parts of code which were also used 11 years ago in some exploit for WebKit so their firewall thinks tui is a malware. This is classic false positive. |
@davidskuza |
I'm one of the lead developers of the ABP Framework.
We are using
Tui Editor
andTui Code Snippet
in some modules of the framework. See https://www.npmjs.com/package/@abp/tui-editorOne of our clients reported that, their security team doesn't allow downloading Tui Editor packages because of a vulnerability in the source-code.
I'm not fully aware what's the under hood of this vulnerability.
But it's called Apple Safari WebKit Selections Use-After-Free Vulnerability and reported in
tui-editor-Editor-full.js
Can you please check out this issue?
Related links:
The text was updated successfully, but these errors were encountered: