Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-24556
HistoryJan 30, 2024 - 5:21 p.m.

CVE-2024-24556 XSS in @urql/next

2024-01-3017:21:19
CWE-79
GitHub_M
www.cve.org
urql/next
graphql client
xss
vulnerability
version 1.1.1
improper escaping
html-like characters
response-stream

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N

0.0005 Low

EPSS

Percentile

17.0%

urql is a GraphQL client that exposes a set of helpers for several frameworks. The @urql/next package is vulnerable to XSS. To exploit this an attacker would need to ensure that the response returns html tags and that the web-application is using streamed responses (non-RSC). This vulnerability is due to improper escaping of html-like characters in the response-stream. To fix this vulnerability upgrade to version 1.1.1

CNA Affected

[
  {
    "vendor": "urql-graphql",
    "product": "urql",
    "versions": [
      {
        "version": "< 1.1.1",
        "status": "affected"
      }
    ]
  }
]

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N

0.0005 Low

EPSS

Percentile

17.0%

Related for CVELIST:CVE-2024-24556