Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f7ph-p5rv-phw2

Опубликовано: 06 нояб. 2018
Источник: github
Github: Прошло ревью

Описание

Cross-Site Scripting in nunjucks

Affected versions of nunjucks do not properly escape specially structured user input in template vars when in auto-escape mode, resulting in a cross-site scripting vulnerability.

Proof of Concept

By using an array for the keys in a template var, escaping is bypassed.

name[]=<script>alert(1)</script>

A full PoC is available in the references section.

Recommendation

Update to version 2.4.3 or later.

Пакеты

Наименование

nunjucks

npm
Затронутые версииВерсия исправления

< 2.4.3

2.4.3

EPSS

Процентиль: 59%
0.0038
Низкий

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 6.1
nvd
больше 7 лет назад

Nunjucks is a full featured templating engine for JavaScript. Versions 2.4.2 and lower have a cross site scripting (XSS) vulnerability in autoescape mode. In autoescape mode, all template vars should automatically be escaped. By using an array for the keys, such as `name[]=<script>alert(1)</script>`, it is possible to bypass autoescaping and inject content into the DOM.

EPSS

Процентиль: 59%
0.0038
Низкий

Дефекты

CWE-79