Описание
happy-dom allows for server side code to be executed by a
Impact
Consumers of the NPM package happy-dom
Patches
The security vulnerability has been patched in v15.10.2
Workarounds
No easy workarounds to my knowledge
References
Ссылки
- https://github.com/capricorn86/happy-dom/security/advisories/GHSA-96g7-g7g9-jxw8
- https://nvd.nist.gov/vuln/detail/CVE-2024-51757
- https://github.com/capricorn86/happy-dom/issues/1585
- https://github.com/capricorn86/happy-dom/pull/1586
- https://github.com/capricorn86/happy-dom/commit/5ee0b1676d4ce20cc2a70d1c9c8d6f1e3f57efac
- https://github.com/capricorn86/happy-dom/commit/d23834c232f1cf5519c9418b073f1dcec6b2f0fd
- https://github.com/capricorn86/happy-dom/releases/tag/v15.10.2
Пакеты
Наименование
happy-dom
npm
Затронутые версииВерсия исправления
< 15.10.2
15.10.2
Связанные уязвимости
nvd
больше 1 года назад
happy-dom is a JavaScript implementation of a web browser without its graphical user interface. Versions of happy-dom prior to 15.10.2 may execute code on the host via a script tag. This would execute code in the user context of happy-dom. Users are advised to upgrade to version 15.10.2. There are no known workarounds for this vulnerability.