Querybook is a user interface for querying big data. Prior to version 3.31.1, there is a vulnerability in Querybook's rich text editor that enables users to input arbitrary URLs without undergoing necessary validation. This particular security flaw allows the use of `javascript:` protocol which can potentially trigger arbitrary client-side execution. The most extreme exploit of this flaw could occur when an admin user unknowingly clicks on a cross-site scripting URL, thereby unintentionally compromising admin role access to the attacker. A patch to rectify this issue has been introduced in Querybook version `3.31.1`. The fix is backward compatible and automatically fixes existing DataDocs. There are no known workarounds for this issue, except for manually checking each URL prior to clicking on them.
References
| Link | Resource |
|---|---|
| https://github.com/pinterest/querybook/commit/bc620dabaaf13ff1dcb30af0b46a490403fb9908 | Patch |
| https://github.com/pinterest/querybook/pull/1412 | Issue Tracking Patch |
| https://github.com/pinterest/querybook/security/advisories/GHSA-fh6g-gvvp-587f | Patch Vendor Advisory |
| https://github.com/pinterest/querybook/commit/bc620dabaaf13ff1dcb30af0b46a490403fb9908 | Patch |
| https://github.com/pinterest/querybook/pull/1412 | Issue Tracking Patch |
| https://github.com/pinterest/querybook/security/advisories/GHSA-fh6g-gvvp-587f | Patch Vendor Advisory |
Configurations
History
05 Feb 2025, 22:02
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:pinterest:querybook:*:*:*:*:*:*:*:* | |
| First Time |
Pinterest
Pinterest querybook |
|
| References | () https://github.com/pinterest/querybook/commit/bc620dabaaf13ff1dcb30af0b46a490403fb9908 - Patch | |
| References | () https://github.com/pinterest/querybook/pull/1412 - Issue Tracking, Patch | |
| References | () https://github.com/pinterest/querybook/security/advisories/GHSA-fh6g-gvvp-587f - Patch, Vendor Advisory |
21 Nov 2024, 09:02
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/pinterest/querybook/commit/bc620dabaaf13ff1dcb30af0b46a490403fb9908 - | |
| References | () https://github.com/pinterest/querybook/pull/1412 - | |
| References | () https://github.com/pinterest/querybook/security/advisories/GHSA-fh6g-gvvp-587f - |
21 Feb 2024, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-02-21 23:15
Updated : 2025-02-05 22:02
NVD link : CVE-2024-26148
Mitre link : CVE-2024-26148
CVE.ORG link : CVE-2024-26148
JSON object : View
Products Affected
- querybook
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
