This affects the package xmlhttprequest before 1.7.0; all versions of package xmlhttprequest-ssl. Provided requests are sent synchronously (async=False
on xhr.open
), malicious user input flowing into xhr.send
could result in arbitrary code being injected and run.
CPE | Name | Operator | Version |
---|---|---|---|
xmlhttprequest | lt | 1.7.0 | |
xmlhttprequest-ssl | lt | 1.6.2 |
github.com/driverdan/node-XMLHttpRequest/blob/1.6.0/lib/XMLHttpRequest.js#L480
github.com/driverdan/node-XMLHttpRequest/blob/1.6.0/lib/XMLHttpRequest.js%23L480
github.com/driverdan/node-XMLHttpRequest/commit/983cfc244c7567ad6a59e366e55a8037e0497fe6
github.com/mjwwit/node-XMLHttpRequest/blob/ae38832a0f1347c5e96dda665402509a3458e302/lib/XMLHttpRequest.js#L531
github.com/mjwwit/node-XMLHttpRequest/commit/ee1e81fc67729c7c0eba5537ed7fe1e30a6b3291
nvd.nist.gov/vuln/detail/CVE-2020-28502
snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1082937
snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1082938
snyk.io/vuln/SNYK-JS-XMLHTTPREQUEST-1082935
snyk.io/vuln/SNYK-JS-XMLHTTPREQUESTSSL-1082936