Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-43800

Опубликовано: 10 сент. 2024
Источник: debian
EPSS Низкий

Описание

serve-static serves static files. serve-static passes untrusted user input - even after sanitizing it - to redirect() may execute untrusted code. This issue is patched in serve-static 1.16.0.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
node-serve-staticfixed2.1.0+~1.15.7-1package
node-serve-staticno-dsabookwormpackage
node-serve-staticpostponedbullseyepackage

Примечания

  • https://github.com/expressjs/serve-static/security/advisories/GHSA-cm22-4g7w-348p

  • https://github.com/expressjs/serve-static/commit/0c11fad159898cdc69fd9ab63269b72468ecaf6b (1.16.0)

  • https://github.com/expressjs/serve-static/commit/ce730896fddce1588111d9ef6fdf20896de5c6fa (2.1.0)

EPSS

Процентиль: 71%
0.00678
Низкий

Связанные уязвимости

CVSS3: 5
ubuntu
больше 1 года назад

serve-static serves static files. serve-static passes untrusted user input - even after sanitizing it - to redirect() may execute untrusted code. This issue is patched in serve-static 1.16.0.

CVSS3: 5
redhat
больше 1 года назад

serve-static serves static files. serve-static passes untrusted user input - even after sanitizing it - to redirect() may execute untrusted code. This issue is patched in serve-static 1.16.0.

CVSS3: 5
nvd
больше 1 года назад

serve-static serves static files. serve-static passes untrusted user input - even after sanitizing it - to redirect() may execute untrusted code. This issue is patched in serve-static 1.16.0.

CVSS3: 4.7
msrc
больше 1 года назад

serve-static affected by template injection that can lead to XSS

CVSS3: 5
github
больше 1 года назад

serve-static vulnerable to template injection that can lead to XSS

EPSS

Процентиль: 71%
0.00678
Низкий