Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-43796

Опубликовано: 10 сент. 2024
Источник: debian
EPSS Низкий

Описание

Express.js minimalist web framework for node. In express < 4.20.0, passing untrusted user input - even after sanitizing it - to response.redirect() may execute untrusted code. This issue is patched in express 4.20.0.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
node-expressfixed4.21.0+~cs8.36.26-1package
node-expressno-dsabookwormpackage
node-expresspostponedbullseyepackage

Примечания

  • https://github.com/expressjs/express/security/advisories/GHSA-qw6h-vgh9-j6wx

  • https://github.com/expressjs/express/commit/54271f69b511fea198471e6ff3400ab805d6b553 (4.20.0)

EPSS

Процентиль: 14%
0.00045
Низкий

Связанные уязвимости

CVSS3: 5
ubuntu
9 месяцев назад

Express.js minimalist web framework for node. In express < 4.20.0, passing untrusted user input - even after sanitizing it - to response.redirect() may execute untrusted code. This issue is patched in express 4.20.0.

CVSS3: 5
redhat
9 месяцев назад

Express.js minimalist web framework for node. In express < 4.20.0, passing untrusted user input - even after sanitizing it - to response.redirect() may execute untrusted code. This issue is patched in express 4.20.0.

CVSS3: 5
nvd
9 месяцев назад

Express.js minimalist web framework for node. In express < 4.20.0, passing untrusted user input - even after sanitizing it - to response.redirect() may execute untrusted code. This issue is patched in express 4.20.0.

CVSS3: 4.7
msrc
8 месяцев назад

Описание отсутствует

CVSS3: 5
github
9 месяцев назад

express vulnerable to XSS via response.redirect()

EPSS

Процентиль: 14%
0.00045
Низкий