Lucene search

K
githubGitHub Advisory DatabaseGHSA-W387-5QQW-7G8M
HistoryMar 29, 2024 - 7:03 p.m.

Content-Security-Policy header generation in middleware could be compromised by malicious injections

2024-03-2919:03:59
CWE-74
GitHub Advisory Database
github.com
11
middleware
compromised
injections
impact
ssr content
automated
allow-listing
malicious
resources
patches
version 1.3.0
workarounds
references
software

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

AI Score

7.1

Confidence

High

EPSS

0

Percentile

9.0%

Impact

When the following conditions are met:

  • Automated CSP headers generation for SSR content is enabled
  • The web application serves content that can be partially controlled by external users

Then it is possible that the CSP headers generation feature might be “allow-listing” malicious injected resources like inlined JS, or references to external malicious scripts.

Patches

Available in version 1.3.0 .

Workarounds

  • Do not enable CSP headers generation.
  • Use it only for dynamically generated content that cannot be controlled by external users in any way.

References

Are there any links users can visit to find out more?

Affected configurations

Vulners
Node
kindspellsastro-shieldMatch1.2.0
VendorProductVersionCPE
kindspellsastro-shield1.2.0cpe:2.3:a:kindspells:astro-shield:1.2.0:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

AI Score

7.1

Confidence

High

EPSS

0

Percentile

9.0%

Related for GHSA-W387-5QQW-7G8M