Astro-Shield is a library to compute the subresource integrity hashes for your JS scripts and CSS stylesheets. When automated CSP headers generation for SSR content is enabled and the web application serves content that can be partially controlled by external users, then it is possible that the CSP headers generation feature might be "allow-listing" malicious injected resources like inlined JS, or references to external malicious scripts. The fix is available in version 1.3.0.
References
Configurations
No configuration.
History
21 Nov 2024, 09:08
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://github.com/KindSpells/astro-shield/commit/41b84576d37fa486a57005ea297658d0bc38566d - | |
References | () https://github.com/KindSpells/astro-shield/security/advisories/GHSA-w387-5qqw-7g8m - |
28 Mar 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-28 13:15
Updated : 2024-11-21 09:08
NVD link : CVE-2024-29896
Mitre link : CVE-2024-29896
CVE.ORG link : CVE-2024-29896
JSON object : View
Products Affected
No product.
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')