Lucene search

K
nodejsMichaΕ‚ BentkowskiNODEJS:1205
HistoryOct 04, 2019 - 7:21 p.m.

Cross-Site Scripting

2019-10-0419:21:25
MichaΕ‚ Bentkowski
www.npmjs.com
13

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

Overview

Versions of dompurify prior to 2.0.3 are vulnerable to Cross-Site Scripting (XSS). The package has an XSS filter bypass due to Mutation XSS in both Chrome and Safari through a combination of &lt;svg&gt;/&lt;math&gt; elements and </p>/</br>. An example payload is: &lt;svg&gt;</p>&lt;style&gt;<a>. This allows attackers to bypass the XSS protection and execute arbitrary JavaScript in a victim’s browser.

Recommendation

Upgrade to version 2.0.3 or later. You may also disallow &lt;svg&gt; and &lt;math&gt; through dompurify configurations:

     FORBID_TAGS: ['svg', 'math']
 });```

## References

- [Vulnerability Report by Securitum](https://research.securitum.com/dompurify-bypass-using-mxss/)
- [GitHub Advisory](https://github.com/advisories/GHSA-chqj-j4fh-rw7m)
CPENameOperatorVersion
dompurifylt2.0.3

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N