@joeattardi/emoji-button is a Vanilla JavaScript emoji picker component. In affected versions there are two vectors for XSS attacks: a URL for a custom emoji, and an i18n string. In both of these cases, a value can be crafted such that it can insert a `script` tag into the page and execute malicious code.
References
Link | Resource |
---|---|
https://github.com/joeattardi/emoji-button/commit/05970c09180cd27fff493e998ac5bf0468b1bb16 | Patch Third Party Advisory |
https://github.com/joeattardi/emoji-button/commit/fe54bef107eb3f74873a4018f2ff49fa124c6a2e | Patch Third Party Advisory |
https://github.com/joeattardi/emoji-button/security/advisories/GHSA-f34m-x9pj-62vq | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-11-26 19:15
Updated : 2024-02-28 18:48
NVD link : CVE-2021-43785
Mitre link : CVE-2021-43785
CVE.ORG link : CVE-2021-43785
JSON object : View
Products Affected
emoji_button_project
- emoji_button
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')