This affects the package xmlhttprequest before 1.7.0; all versions of package xmlhttprequest-ssl. Provided requests are sent synchronously (async=False on xhr.open), malicious user input flowing into xhr.send could result in arbitrary code being injected and run.
References
Link | Resource |
---|---|
https://github.com/driverdan/node-XMLHttpRequest/blob/1.6.0/lib/XMLHttpRequest.js%23L480 | Broken Link |
https://snyk.io/vuln/SNYK-JS-XMLHTTPREQUEST-1082935 | Exploit Third Party Advisory |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1082937 | Exploit Third Party Advisory |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1082938 | Exploit Third Party Advisory |
https://snyk.io/vuln/SNYK-JS-XMLHTTPREQUESTSSL-1082936 | Exploit Third Party Advisory |
Configurations
Information
Published : 2021-03-05 10:15
Updated : 2021-03-16 09:12
NVD link : CVE-2020-28502
Mitre link : CVE-2020-28502
JSON object : View
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
Products Affected
xmlhttprequest_project
- xmlhttprequest