Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-79mx-88w7-8f7q

Опубликовано: 06 нояб. 2018
Источник: github
Github: Прошло ревью
CVSS3: 6.1

Описание

XSS Filter Bypass via Encoded URL in validator

Versions of validator prior to 2.0.0 contained an xss filter method that is affected by several filter bypasses. This may result in a cross-site scripting vulnerability.

Proof of Concept

The xss() function removes the word "javascript" when contained inside an attribute.

However, it does not properly handle cases where characters have been hex-encoded.

As a result, it is possible to build an input that bypasses the filter but which the browser will accept as valid JavaScript.

For example: <a href="jav&#x61;script:...">abc</a> will render as: <a href="javascript:...">abc</a>

Recommendation

The package author has decided to remove the xss filter functionality in the latest version of this module. If this feature is not currently being used, you are not affected by the vulnerability. If it is being used, updating to the latest version of the module will break your application.

In order for affected users to mitigate this vulnerability, it is necessary to use an alternative package that provides similar functionality.

Пакеты

Наименование

validator

npm
Затронутые версииВерсия исправления

< 2.0.0

2.0.0

EPSS

Процентиль: 68%
0.00602
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 6.1
ubuntu
больше 8 лет назад

The validator package before 2.0.0 for Node.js allows remote attackers to bypass the cross-site scripting (XSS) filter via hex-encoded characters.

CVSS3: 6.1
nvd
больше 8 лет назад

The validator package before 2.0.0 for Node.js allows remote attackers to bypass the cross-site scripting (XSS) filter via hex-encoded characters.

CVSS3: 6.1
debian
больше 8 лет назад

The validator package before 2.0.0 for Node.js allows remote attackers ...

EPSS

Процентиль: 68%
0.00602
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-79