GraphQL Playground (graphql-playground-html NPM package) before version 1.6.22 have a severe XSS Reflection attack vulnerability. All unsanitized user input passed into renderPlaygroundPage() method could trigger this vulnerability. This has been patched in graphql-playground-html version 1.6.22. Note that some of the associated dependent middleware packages are also affected including but not limited to graphql-playground-middleware-express before version 1.7.16, graphql-playground-middleware-koa before version 1.6.15, graphql-playground-middleware-lambda before version 1.7.17, and graphql-playground-middleware-hapi before 1.6.13.
References
Link | Resource |
---|---|
https://github.com/prisma-labs/graphql-playground/commit/bf1883db538c97b076801a60677733816cb3cfb7 | Patch Third Party Advisory |
https://github.com/prisma-labs/graphql-playground/security/advisories/GHSA-4852-vrh7-28rf | Mitigation Third Party Advisory |
https://github.com/prisma-labs/graphql-playground#security-details | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-06-08 14:15
Updated : 2020-06-12 07:38
NVD link : CVE-2020-4038
Mitre link : CVE-2020-4038
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
prisma
- graphql-playground-middleware-hapi
- graphql-playground-middleware-lambda
- graphql-playground-html
- graphql-playground-middleware-koa
- graphql-playground-middleware-express