have default text filtering turned
as SU create an article that uses html 5
save article and view it.
turn filtering off and edit same article.
save article
view article again
article visual layout will not have changed.
display is completely destroyed.
systeminfo-2024-04-10T08_28_02+00_00.txt
the html code used in the article is as follows
<h2 class="text-danger text-center"><i class="fa fa-shield-alt fa-lg"></i> <b>Security release!</b> <i class="fa fa-shield-alt fa-lg padding-horiz-30"></i></h2>
<div class="accordion accordion-flush" id="accordionFlushExample">
<div class="accordion-item">
<h2 class="accordion-header" id="flush-headingOne"><button class="accordion-button collapsed" type="button" data-bs-toggle="collapse" data-bs-target="#flush-collapseOne" aria-expanded="false" aria-controls="flush-collapseOne"> Vulnerability List </button></h2>
<div id="flush-collapseOne" class="accordion-collapse collapse" aria-labelledby="flush-headingOne" data-bs-parent="#accordionFlushExample">
<div class="apcontents"><!-- PLACE ARTICLE CONTENT FOR VULNERABILITY HERE -->
<dl>
<dt>
<h3 id="CVE-2023-38709">moderate: <name name="CVE-2023-38709">Apache HTTP Server: HTTP response splitting</name> (<a href="https://www.cve.org/CVERecord?id=CVE-2023-38709">CVE-2023-38709</a>)</h3>
</dt>
<dd>
<p>Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses.</p>
<p></p>
<p>This issue affects Apache HTTP Server: through 2.4.58.</p>
<p></p>
<p>Acknowledgements: finder: Orange Tsai (@orange_8361) from DEVCORE</p>
<table class="table">
<tbody>
<tr>
<td class="cve-header">Reported to security team</td>
<td class="cve-value">2023-06-26</td>
</tr>
<tr>
<td class="cve-header">Update 2.4.59 released</td>
<td class="cve-value">2024-04-04</td>
</tr>
<tr>
<td class="cve-header">Affects</td>
<td class="cve-value"><=2.4.58</td>
</tr>
</tbody>
</table>
</dd>
<dt>
<h3 id="CVE-2024-24795">low: <name name="CVE-2024-24795">Apache HTTP Server: HTTP Response Splitting in multiple modules</name> (<a href="https://www.cve.org/CVERecord?id=CVE-2024-24795">CVE-2024-24795</a>)</h3>
</dt>
<dd>
<p>HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack.</p>
<p></p>
<p>Users are recommended to upgrade to version 2.4.59, which fixes this issue.</p>
<p>Acknowledgements:</p>
<ul>
<li>finder: Keran Mu, Tsinghua University and Zhongguancun Laboratory.</li>
<li>finder: Jianjun Chen, Tsinghua University and Zhongguancun Laboratory.</li>
</ul>
<table class="table">
<tbody>
<tr>
<td class="cve-header">Reported to security team</td>
<td class="cve-value">2023-09-06</td>
</tr>
<tr>
<td class="cve-header">Update 2.4.59 released</td>
<td class="cve-value">2024-04-04</td>
</tr>
<tr>
<td class="cve-header">Affects</td>
<td class="cve-value"><=2.4.58</td>
</tr>
</tbody>
</table>
</dd>
<dt>
<h3 id="CVE-2024-27316">moderate: <name name="CVE-2024-27316">Apache HTTP Server: HTTP/2 DoS by memory exhaustion on endless continuation frames</name> (<a href="https://www.cve.org/CVERecord?id=CVE-2024-27316">CVE-2024-27316</a>)</h3>
</dt>
<dd>
<p>HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.</p>
<p>Acknowledgements: finder: Bartek Nowotarski (https://nowotarski.info/)</p>
<table class="table">
<tbody>
<tr>
<td class="cve-header">Reported to security team</td>
<td class="cve-value">2024-02-22</td>
</tr>
<tr>
<td class="cve-header">Update 2.4.59 released</td>
<td class="cve-value">2024-04-04</td>
</tr>
<tr>
<td class="cve-header">Affects</td>
<td class="cve-value"><=2.4.58</td>
</tr>
</tbody>
</table>
</dd>
</dl>
</div>
</div>
</div>
<!-- END VULNERABILITY LIST -->
<div class="accordion-item">
<h2 class="accordion-header" id="flush-headingTwo"><button class="accordion-button collapsed" type="button" data-bs-toggle="collapse" data-bs-target="#flush-collapseTwo" aria-expanded="false" aria-controls="flush-collapseTwo"> Change Log</button></h2>
<div id="flush-collapseTwo" class="accordion-collapse collapse" aria-labelledby="flush-headingTwo" data-bs-parent="#accordionFlushExample">
<div class="accordion-body"><span class="postdetails">Posted: Thu 04 Apr '24 17:05<br />Post subject: Apache httpd 2.4.59 GA Available</span><hr /><span class="postbody">Apache httpd 2.4.59 is released as GA. <br /><br />ASF and Apachelounge changes :<span style="font-weight: bold;"> <a href="https://www.apachelounge.com/Changelog-2.4.html" target="_blank" rel="noopener">https://www.apachelounge.com/Changelog-2.4.html</a> </span> <br /><br /><span style="font-weight: bold;"><span style="color: blue;">Important</span></span> security vulnerabilities are fixed in 2.4.59, see <span style="font-weight: bold;"> <a href="https://httpd.apache.org/security/vulnerabilities_24.html" target="_blank" rel="noopener">https://httpd.apache.org/security/vulnerabilities_24.html</a> </span>. <br /><br /><span style="font-weight: bold;">VS17 Win32</span> <br />The Win32 version is available again, see also discussion <span style="font-weight: bold;"> <a href="https://www.apachelounge.com/viewtopic.php?p=42099" target="_blank" rel="noopener">https://www.apachelounge.com/viewtopic.php?p=42099</a> </span> <br />Only build the with the standard Apache modules. <br />For non-standard modules (like mod_fcgid) use the VS16 Win32 ones at<span style="font-weight: bold;"> <a href="https://www.apachelounge.com/download/VS16/" target="_blank" rel="noopener">https://www.apachelounge.com/download/VS16/</a> </span> <br /><br />Documentation:<span style="font-weight: bold;"> <a href="http://httpd.apache.org/docs/2.4/" target="_blank" rel="noopener">http://httpd.apache.org/docs/2.4/</a> </span> <br /><br />Build with dependencies: <br /><br />- openssl 3.1.5 <br />- nghttp2 1.61.0 <br />- jansson 2.14 <br />- curl 8.7.1 <br />- apr 1.7.3 <br />- apr-util 1.6.3 <br />- apr-iconv 1.2.2 <br />- zlib 1.3.1 <br />- brotli 1.1.0 <br />- pcre2 10.43 <br />- libxml2 2.12.6 <br />- lua 5.4.6 <br />- expat 2.5.0 <br /><br /><span style="font-weight: bold;">Notes VS17 OpenSSL 3.x.x:</span> <br /><br />- <span style="font-weight: bold;">Only PHP 8.2 and 8.1</span> (build with 3.x.x) is running as module. <br /><span style="font-weight: bold;"><span style="color: green;">Running with mod_fcgid no issues seen</span></span>. <br /><br />For running as module, See also the post from <span style="font-weight: bold;">user Otomatic and notes </span> at<span style="font-weight: bold;"> <a href="https://www.apachelounge.com/viewtopic.php?t=8969" target="_blank" rel="noopener">https://www.apachelounge.com/viewtopic.php?t=8969</a> <br /></span> and<span style="font-weight: bold;"> <a href="https://www.apachelounge.com/viewtopic.php?t=8938" target="_blank" rel="noopener">https://www.apachelounge.com/viewtopic.php?t=8938</a> <br /></span> <br />- With too weak certificates/ciphers Apache does not start, see<span style="font-weight: bold;"> <a href="https://www.apachelounge.com/viewtopic.php?t=8819" target="_blank" rel="noopener">https://www.apachelounge.com/viewtopic.php?t=8819</a> </span> <br /><br /><br />Enjoy, <br /><br />Steffen</span><span class="gensmall"></span><!-- END CHANGELOG --></div>
</div>
</div>
<div class="accordion-item">
<h2 class="accordion-header" id="flush-headingThree"><button class="accordion-button collapsed" type="button" data-bs-toggle="collapse" data-bs-target="#flush-collapseThree" aria-expanded="false" aria-controls="flush-collapseThree"> Release Files</button></h2>
<div id="flush-collapseThree" class="accordion-collapse collapse" aria-labelledby="flush-headingThree" data-bs-parent="#accordionFlushExample">
<div class="accordion-body"><!-- RELEASE FILES LINK(S) HERE --> <a href="https://github.com/Bearsampp/module-apache/releases/tag/2024.4.7"> https://github.com/Bearsampp/module-apache/releases/tag/2024.4.7 </a> <!-- END RELEASE FILES LINK(S) --></div>
</div>
</div>
</div>
Labels |
Added:
No Code Attached Yet
|
when you turn off the filter in tinymce then the filter in joomla takes over and you havent shared what the joomla filter settings are. so you can not simply say turn off filter and expect everyone to read your mind.
i did check the code that you pasted but I see now that you have deleted that code and pasted different code instead.
you talk about html5 but then the code you are sharing is not html5
can you replicated your issue with the tinymce playground?
Obviously the most useful thing would be for you to post the code that you entered into the editor and then copy the changed code here so that we can see the difference.
You should also know that any changes you are seeing when you toggle the editor may be because of tinymce code validation and fixing and this is not the same as security filters.
This is a support issue and not an issue that is anything to do with core joomla.
This is the results of my test with the original code you posted.
The three files are
The only differences are
the current code included is the current code
and the current code is xhtml and completely invalid markup with fictitious html elements. tiny tries to fix that for you. that is nothing to do with the filters which are restrictions due to security.
This is not a joomla issue and should be closed. Nothing to do here and no need for anyone else to waste time
Status | New | ⇒ | Closed |
Closed_Date | 0000-00-00 00:00:00 | ⇒ | 2024-04-10 18:27:30 |
Closed_By | ⇒ | chmst |
As @brianteeman wrote. I checked your code and it is as he writes.
What do you mean by "turn filtering off"