This affects the package xmlhttprequest before 1.7.0; all versions of package xmlhttprequest-ssl. Provided requests are sent synchronously (async=False on xhr.open), malicious user input flowing into xhr.send could result in arbitrary code being injected and run.
References
Link | Resource |
---|---|
https://github.com/driverdan/node-XMLHttpRequest/blob/1.6.0/lib/XMLHttpRequest.js%23L480 | Broken Link |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1082937 | Exploit Third Party Advisory |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1082938 | Exploit Third Party Advisory |
https://snyk.io/vuln/SNYK-JS-XMLHTTPREQUEST-1082935 | Exploit Third Party Advisory |
https://snyk.io/vuln/SNYK-JS-XMLHTTPREQUESTSSL-1082936 | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: snyk
Published: 2021-03-05T00:00:00
Updated: 2021-03-05T17:25:16
Reserved: 2020-11-12T00:00:00
Link: CVE-2020-28502
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-03-05T18:15:12.830
Modified: 2021-03-16T16:12:47.017
Link: CVE-2020-28502
JSON object: View
Redhat Information
No data.
CWE