SVG Loader is a javascript library that fetches SVGs using XMLHttpRequests and injects the SVG code in the tag's place. According to the docs, svg-loader will strip all JS code before injecting the SVG file for security reasons but the input sanitization logic is not sufficient and can be trivially bypassed. This allows an attacker to craft a malicious SVG which can result in Cross-site Scripting (XSS). When trying to sanitize the svg the lib removes event attributes such as `onmouseover`, `onclick` but the list of events is not exhaustive. Any website which uses external-svg-loader and allows its users to provide svg src, upload svg files would be susceptible to stored XSS attack. This issue has been addressed in commit `d3562fc08` which is included in releases from 1.6.9. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Configurations
History
23 Aug 2023, 00:03
Type | Values Removed | Values Added |
---|---|---|
First Time |
Shubhamjain svg Loader
Shubhamjain |
|
CPE | cpe:2.3:a:shubhamjain:svg_loader:*:*:*:*:*:node.js:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
References | (MISC) https://github.com/shubhamjain/svg-loader/blob/main/svg-loader.js#L125-L128 - Product | |
References | (MISC) https://github.com/shubhamjain/svg-loader/tree/main#2-enable-javascript - Product | |
References | (MISC) https://github.com/shubhamjain/svg-loader/commit/d3562fc08497aec5f33eb82017fa1417b3319e2c - Patch | |
References | (MISC) https://github.com/shubhamjain/svg-loader/security/advisories/GHSA-xc2r-jf2x-gjr8 - Vendor Advisory |
14 Aug 2023, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-08-14 21:15
Updated : 2024-02-28 20:33
NVD link : CVE-2023-40013
Mitre link : CVE-2023-40013
CVE.ORG link : CVE-2023-40013
JSON object : View
Products Affected
shubhamjain
- svg_loader
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')