Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-43370

Опубликовано: 16 авг. 2024
Источник: debian

Описание

gettext.js is a GNU gettext port for node and the browser. There is a cross-site scripting (XSS) injection if `.po` dictionary definition files are corrupted. This vulnerability has been patched in version 2.0.3. As a workaround, control the origin of the definition catalog to prevent the use of this flaw in the definition of plural forms.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gettext.jsfixed0.7.0-4package
gettext.jsfixed0.7.0-2+deb11u1bookwormpackage
gettext.jsfixed0.7.0-2+deb11u1bullseyepackage

Примечания

  • https://github.com/guillaumepotier/gettext.js/security/advisories/GHSA-vwhg-jwr4-vxgg

  • Fixed by: https://github.com/guillaumepotier/gettext.js/commit/6e52e0f8fa7d7c8b358e78b613d47ea332b8a56c (2.0.3)

Связанные уязвимости

CVSS3: 7.2
ubuntu
больше 1 года назад

gettext.js is a GNU gettext port for node and the browser. There is a cross-site scripting (XSS) injection if `.po` dictionary definition files are corrupted. This vulnerability has been patched in version 2.0.3. As a workaround, control the origin of the definition catalog to prevent the use of this flaw in the definition of plural forms.

CVSS3: 7.2
nvd
больше 1 года назад

gettext.js is a GNU gettext port for node and the browser. There is a cross-site scripting (XSS) injection if `.po` dictionary definition files are corrupted. This vulnerability has been patched in version 2.0.3. As a workaround, control the origin of the definition catalog to prevent the use of this flaw in the definition of plural forms.

CVSS3: 7.2
github
больше 1 года назад

gettext.js has a Cross-site Scripting injection