Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-29896
HistoryMar 28, 2024 - 12:48 p.m.

CVE-2024-29896 Astro-Shield's Content-Security-Policy header generation in middleware could be compromised by malicious injections

2024-03-2812:48:53
CWE-74
GitHub_M
github.com
3
astro-shield library
content security policy
injection vulnerability
fix available
version 1.3.0

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

AI Score

6.8

Confidence

Low

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

Astro-Shield is a library to compute the subresource integrity hashes for your JS scripts and CSS stylesheets. When automated CSP headers generation for SSR content is enabled and the web application serves content that can be partially controlled by external users, then it is possible that the CSP headers generation feature might be “allow-listing” malicious injected resources like inlined JS, or references to external malicious scripts. The fix is available in version 1.3.0.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:kindspells:astro-shield:1.2.0:*:*:*:*:*:*:*"
    ],
    "vendor": "kindspells",
    "product": "astro-shield",
    "versions": [
      {
        "status": "affected",
        "version": "1.2.0",
        "lessThan": "1.3.0",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

AI Score

6.8

Confidence

Low

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-29896