Highcharts JS is a JavaScript charting library based on SVG. In Highcharts versions 8 and earlier, the chart options structure was not systematically filtered for XSS vectors. The potential impact was that content from untrusted sources could execute code in the end user's browser. The vulnerability is patched in version 9. As a workaround, implementers who are not able to upgrade may apply DOMPurify recursively to the options structure to filter out malicious markup.
References
Link | Resource |
---|---|
https://github.com/highcharts/highcharts/security/advisories/GHSA-8j65-4pcq-xq95 | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20210622-0005/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2021-05-05 09:15
Updated : 2022-06-03 18:45
NVD link : CVE-2021-29489
Mitre link : CVE-2021-29489
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
netapp
- cloud_backup
- oncommand_insight
- oncommand_workflow_automation
- snapcenter
highcharts
- highcharts