Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vwhg-jwr4-vxgg

Опубликовано: 15 авг. 2024
Источник: github
Github: Прошло ревью
CVSS3: 7.2

Описание

gettext.js has a Cross-site Scripting injection

Impact

Possible vulnerability to XSS injection if .po dictionary definition files is corrupted

Patches

Update gettext.js to 2.0.3

Workarounds

Make sure you control the origin of the definition catalog to prevent the use of this flaw in the definition of plural forms.

Пакеты

Наименование

gettext.js

npm
Затронутые версииВерсия исправления

< 2.0.3

2.0.3

EPSS

Процентиль: 61%
0.00421
Низкий

7.2 High

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 7.2
ubuntu
больше 1 года назад

gettext.js is a GNU gettext port for node and the browser. There is a cross-site scripting (XSS) injection if `.po` dictionary definition files are corrupted. This vulnerability has been patched in version 2.0.3. As a workaround, control the origin of the definition catalog to prevent the use of this flaw in the definition of plural forms.

CVSS3: 7.2
nvd
больше 1 года назад

gettext.js is a GNU gettext port for node and the browser. There is a cross-site scripting (XSS) injection if `.po` dictionary definition files are corrupted. This vulnerability has been patched in version 2.0.3. As a workaround, control the origin of the definition catalog to prevent the use of this flaw in the definition of plural forms.

CVSS3: 7.2
debian
больше 1 года назад

gettext.js is a GNU gettext port for node and the browser. There is a ...

EPSS

Процентиль: 61%
0.00421
Низкий

7.2 High

CVSS3

Дефекты

CWE-79