The package @braintree/sanitize-url before 6.0.0 are vulnerable to Cross-site Scripting (XSS) due to improper sanitization in sanitizeUrl function.
References
Link | Resource |
---|---|
https://snyk.io/vuln/SNYK-JS-BRAINTREESANITIZEURL-2339882 | Exploit Patch Third Party Advisory |
https://github.com/braintree/sanitize-url/pull/40 | Issue Tracking Patch Third Party Advisory |
https://github.com/braintree/sanitize-url/pull/40/commits/e5afda45d9833682b705f73fc2c1265d34832183 | Patch Third Party Advisory |
https://github.com/braintree/sanitize-url/blob/main/src/index.ts%23L11 | Broken Link |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2PFW6Q2LXXWTFRTMTRN4ZGADFRQPKJ3D/ | Mailing List Patch Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HLAQRRGNSO5MYCPAXGPH2OCSHOGHSQMQ/ | Mailing List Patch Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36GUEPA5TPSC57DZTPYPBL6T7UPQ2FRH/ | Mailing List Third Party Advisory |
Information
Published : 2022-03-16 09:15
Updated : 2022-06-15 14:40
NVD link : CVE-2021-23648
Mitre link : CVE-2021-23648
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
paypal
- braintree\/sanitize-url
fedoraproject
- fedora