Lucene search

K
githubGitHub Advisory DatabaseGHSA-QHJF-HM5J-335W
HistoryJan 30, 2024 - 8:57 p.m.

@urql/next Cross-site Scripting vulnerability

2024-01-3020:57:28
CWE-79
GitHub Advisory Database
github.com
10
cross-site scripting
@urql/next
upgrade
version 1.1.1
vulnerability
response-stream
web-application

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N

6.7 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.0%

impact

The @urql/next package is vulnerable to XSS. To exploit this an attacker would need to ensure that the response returns html tags and that the web-application is using streamed responses (non-RSC). This vulnerability is due to improper escaping of html-like characters in the response-stream.

To fix this vulnerability upgrade to version 1.1.1

Affected configurations

Vulners
Node
urqlnextRange<1.1.1
CPENameOperatorVersion
@urql/nextlt1.1.1

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N

6.7 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.0%

Related for GHSA-QHJF-HM5J-335W