Files
CVEs-PoC/2021/CVE-2021-3163.md
2025-09-29 21:09:30 +02:00

18 lines
814 B
Markdown

### [CVE-2021-3163](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3163)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen)
### Description
A vulnerability in the HTML editor of Slab Quill 4.8.0 allows an attacker to execute arbitrary JavaScript by storing an XSS payload (a crafted onloadstart attribute of an IMG element) in a text field. Note: Researchers have claimed that this issue is not within the product itself, but is intended behavior in a web browser
### POC
#### Reference
- https://github.com/quilljs/quill/issues/3364
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds