The package express-xss-sanitizer before 1.1.3 are vulnerable to Prototype Pollution via the allowedTags attribute, allowing the attacker to bypass xss sanitization.
References
Link | Resource |
---|---|
https://github.com/AhmedAdelFahim/express-xss-sanitizer/commit/3bf8aaaf4dbb1c209dcb8d87a82711a54c1ab39a | Patch Third Party Advisory |
https://github.com/AhmedAdelFahim/express-xss-sanitizer/issues/4 | Exploit Issue Tracking Third Party Advisory |
https://security.snyk.io/vuln/SNYK-JS-EXPRESSXSSSANITIZER-3027443 | Exploit Third Party Advisory |
https://runkit.com/embed/w306l6zfm7tu | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-09-25 22:15
Updated : 2022-09-28 10:21
NVD link : CVE-2022-21169
Mitre link : CVE-2022-21169
JSON object : View
CWE
CWE-1321
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Products Affected
express_xss_sanitizer_project
- express_xss_sanitizer