Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-10491

Опубликовано: 29 окт. 2024
Источник: redhat
CVSS3: 5.4
EPSS Низкий

Описание

A vulnerability has been identified in the Express response.links function, allowing for arbitrary resource injection in the Link header when unsanitized data is used. The issue arises from improper sanitization in Link header values, which can allow a combination of characters like ,, ;, and <> to preload malicious resources. This vulnerability is especially relevant for dynamic parameters.

A flaw was found in the Express Node.js framework. In certain versions, an attacker may be able to trigger an arbitrary resource injection attack via the link header when unsanitized data is used.

Отчет

This CVE affects Express versions 3.21.4 and prior, which have reached end of life status. No Red Hat products are affected by this vulnerability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
A-MQ Interconnect 1qpid-dispatchNot affected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/kibana6-rhel8Not affected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/logging-view-plugin-rhel9Not affected
Migration Toolkit for Applications 7mta/mta-cli-rhel9Not affected
Migration Toolkit for Applications 7mta/mta-ui-rhel9Not affected
Migration Toolkit for Containersrhmtc/openshift-migration-ui-rhel8Not affected
Migration Toolkit for Virtualizationmigration-toolkit-virtualization/mtv-console-plugin-rhel9Not affected
Multicluster Engine for Kubernetesmulticluster-engine/console-mce-rhel8Not affected
Network Observability Operatornetwork-observability/network-observability-console-plugin-rhel9Not affected
Node HealthCheck Operatorworkload-availability/node-remediation-console-rhel8Not affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-74
https://bugzilla.redhat.com/show_bug.cgi?id=2322502express: Preload arbitrary resources by injecting additional `Link` headers

EPSS

Процентиль: 8%
0.00033
Низкий

5.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 4
ubuntu
8 месяцев назад

A vulnerability has been identified in the Express response.links function, allowing for arbitrary resource injection in the Link header when unsanitized data is used. The issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `<>` to preload malicious resources. This vulnerability is especially relevant for dynamic parameters.

CVSS3: 4
nvd
8 месяцев назад

A vulnerability has been identified in the Express response.links function, allowing for arbitrary resource injection in the Link header when unsanitized data is used. The issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `<>` to preload malicious resources. This vulnerability is especially relevant for dynamic parameters.

CVSS3: 4
debian
8 месяцев назад

A vulnerability has been identified in the Express response.linksfunct ...

CVSS3: 4
github
8 месяцев назад

Express ressource injection

EPSS

Процентиль: 8%
0.00033
Низкий

5.4 Medium

CVSS3