The package express-xss-sanitizer before 1.1.3 are vulnerable to Prototype Pollution via the allowedTags attribute, allowing the attacker to bypass xss sanitization.
References
Link | Resource |
---|---|
https://github.com/AhmedAdelFahim/express-xss-sanitizer/commit/3bf8aaaf4dbb1c209dcb8d87a82711a54c1ab39a | Patch Third Party Advisory |
https://github.com/AhmedAdelFahim/express-xss-sanitizer/issues/4 | Exploit Issue Tracking Third Party Advisory |
https://runkit.com/embed/w306l6zfm7tu | Patch Third Party Advisory URL Repurposed |
https://security.snyk.io/vuln/SNYK-JS-EXPRESSXSSSANITIZER-3027443 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | (CONFIRM) https://runkit.com/embed/w306l6zfm7tu - Patch, Third Party Advisory, URL Repurposed |
Information
Published : 2022-09-26 05:15
Updated : 2024-02-28 19:29
NVD link : CVE-2022-21169
Mitre link : CVE-2022-21169
CVE.ORG link : CVE-2022-21169
JSON object : View
Products Affected
express_xss_sanitizer_project
- express_xss_sanitizer
CWE
CWE-1321
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')