This affects the package edge.js before 5.3.2. A type confusion vulnerability can be used to bypass input sanitization when the input to be rendered is an array (instead of a string or a SafeValue), even if {{ }} are used.
References
Link | Resource |
---|---|
https://github.com/edge-js/edge/commit/fa2c7fde86327aeae232752e89a6e37e2e469e21 | Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-JS-EDGEJS-1579556 | Exploit Patch Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: snyk
Published: 2021-09-21T00:00:00
Updated: 2021-09-21T16:50:10
Reserved: 2021-01-08T00:00:00
Link: CVE-2021-23443
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-09-21T17:15:09.297
Modified: 2022-05-03T16:04:40.443
Link: CVE-2021-23443
JSON object: View
Redhat Information
No data.
CWE