Lucene search

K
githubGitHub Advisory DatabaseGHSA-GRJP-4JMR-MJCW
HistorySep 27, 2022 - 12:00 a.m.

express-xss-sanitizer vulnerable to Prototype Pollution via allowedTags attribute

2022-09-2700:00:22
CWE-1321
GitHub Advisory Database
github.com
16
express-xss-sanitizer
prototype pollution
allowedtags
bypass
xss
sanitization

CVSS3

7.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P

EPSS

0.001

Percentile

45.1%

The package express-xss-sanitizer before 1.1.3 is vulnerable to Prototype Pollution via the allowedTags attribute, allowing the attacker to bypass xss sanitization.

Affected configurations

Vulners
Node
express_xss_sanitizer_projectexpress_xss_sanitizerRange<1.1.3node.js
VendorProductVersionCPE
express_xss_sanitizer_projectexpress_xss_sanitizer*cpe:2.3:a:express_xss_sanitizer_project:express_xss_sanitizer:*:*:*:*:*:node.js:*:*

CVSS3

7.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P

EPSS

0.001

Percentile

45.1%

Related for GHSA-GRJP-4JMR-MJCW