The package express-xss-sanitizer before 1.1.3 are vulnerable to Prototype Pollution via the allowedTags attribute, allowing the attacker to bypass xss sanitization.
References
Link | Resource |
---|---|
https://github.com/AhmedAdelFahim/express-xss-sanitizer/commit/3bf8aaaf4dbb1c209dcb8d87a82711a54c1ab39a | Patch Third Party Advisory |
https://github.com/AhmedAdelFahim/express-xss-sanitizer/issues/4 | Exploit Issue Tracking Third Party Advisory |
https://runkit.com/embed/w306l6zfm7tu | Patch Third Party Advisory URL Repurposed |
https://security.snyk.io/vuln/SNYK-JS-EXPRESSXSSSANITIZER-3027443 | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: snyk
Published: 2022-09-26T00:00:00
Updated: 2022-09-26T05:05:11
Reserved: 2022-02-24T00:00:00
Link: CVE-2022-21169
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-09-26T05:15:10.133
Modified: 2024-02-14T01:17:43.863
Link: CVE-2022-21169
JSON object: View
Redhat Information
No data.
CWE