Lucene search

K
nodejsAnonymousNODEJS:1758
HistoryJun 21, 2021 - 5:00 p.m.

Sanitization Bypass

2021-06-2117:00:57
Anonymous
www.npmjs.com
112
sanitization bypass
type-confusion
vulnerability
concatenate
unsanitized strings
xss
upgrade

EPSS

0.001

Percentile

48.3%

Overview

A type-confusion vulnerability can cause striptags to concatenate unsanitized strings when an array-like object is passed in as the html parameter. This can be abused by an attacker who can control the shape of their input, e.g. if query parameters are passed directly into the function.

Impact

XSS

Workarounds

Ensure that the html parameter is a string before calling the function.

Recommendation

Upgrade to version 3.2.0 or later

References

EPSS

0.001

Percentile

48.3%