The npm package "striptags" is an implementation of PHP's strip_tags in Typescript. In striptags before version 3.2.0, a type-confusion vulnerability can cause `striptags` to concatenate unsanitized strings when an array-like object is passed in as the `html` parameter. This can be abused by an attacker who can control the shape of their input, e.g. if query parameters are passed directly into the function. This can lead to a XSS.
References
Link | Resource |
---|---|
https://github.com/ericnorris/striptags/commit/f252a6b0819499cd65403707ebaf5cc925f2faca | Patch Third Party Advisory |
https://www.npmjs.com/package/striptags | Product Third Party Advisory |
https://github.com/ericnorris/striptags/security/advisories/GHSA-qxg5-2qff-p49r | Third Party Advisory |
https://github.com/ericnorris/striptags/releases/tag/v3.2.0 | Third Party Advisory |
Configurations
Information
Published : 2021-06-18 13:15
Updated : 2021-06-24 12:20
NVD link : CVE-2021-32696
Mitre link : CVE-2021-32696
JSON object : View
CWE
CWE-843
Access of Resource Using Incompatible Type ('Type Confusion')
Products Affected
striptags_project
- striptags