CVE-2021-32696

The npm package "striptags" is an implementation of PHP's strip_tags in Typescript. In striptags before version 3.2.0, a type-confusion vulnerability can cause `striptags` to concatenate unsanitized strings when an array-like object is passed in as the `html` parameter. This can be abused by an attacker who can control the shape of their input, e.g. if query parameters are passed directly into the function. This can lead to a XSS.
Configurations

Configuration 1 (hide)

cpe:2.3:a:striptags_project:striptags:*:*:*:*:*:node.js:*:*

History

21 Nov 2024, 06:07

Type Values Removed Values Added
CVSS v2 : 5.0
v3 : 5.3
v2 : 5.0
v3 : 3.7
References () https://github.com/ericnorris/striptags/commit/f252a6b0819499cd65403707ebaf5cc925f2faca - Patch, Third Party Advisory () https://github.com/ericnorris/striptags/commit/f252a6b0819499cd65403707ebaf5cc925f2faca - Patch, Third Party Advisory
References () https://github.com/ericnorris/striptags/releases/tag/v3.2.0 - Third Party Advisory () https://github.com/ericnorris/striptags/releases/tag/v3.2.0 - Third Party Advisory
References () https://github.com/ericnorris/striptags/security/advisories/GHSA-qxg5-2qff-p49r - Third Party Advisory () https://github.com/ericnorris/striptags/security/advisories/GHSA-qxg5-2qff-p49r - Third Party Advisory
References () https://www.npmjs.com/package/striptags - Product, Third Party Advisory () https://www.npmjs.com/package/striptags - Product, Third Party Advisory

Information

Published : 2021-06-18 20:15

Updated : 2024-11-21 06:07


NVD link : CVE-2021-32696

Mitre link : CVE-2021-32696

CVE.ORG link : CVE-2021-32696


JSON object : View

Products Affected

striptags_project

  • striptags
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-241

Improper Handling of Unexpected Data Type

CWE-843

Access of Resource Using Incompatible Type ('Type Confusion')