ghsa-3j7m-hmh3-9jmp
Vulnerability from github
Published
2020-04-16 03:14
Modified
2021-08-23 15:18
Severity ?
Summary
Cross-Site Scripting in sanitize-html
Details
Affected versions of sanitize-html
do not sanitize input recursively, which may allow an attacker to execute arbitrary Javascript.
Recommendation
Update to version 1.4.3 or later.
{ affected: [ { package: { ecosystem: "npm", name: "sanitize-html", }, ranges: [ { events: [ { introduced: "0", }, { fixed: "1.4.3", }, ], type: "ECOSYSTEM", }, ], }, ], aliases: [ "CVE-2016-1000237", ], database_specific: { cwe_ids: [ "CWE-79", ], github_reviewed: true, github_reviewed_at: "2020-04-16T02:54:08Z", nvd_published_at: null, severity: "MODERATE", }, details: "Affected versions of `sanitize-html` do not sanitize input recursively, which may allow an attacker to execute arbitrary Javascript.\n\n\n## Recommendation\n\nUpdate to version 1.4.3 or later.", id: "GHSA-3j7m-hmh3-9jmp", modified: "2021-08-23T15:18:04Z", published: "2020-04-16T03:14:47Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2016-1000237", }, { type: "WEB", url: "https://github.com/apostrophecms/sanitize-html/issues/29", }, { type: "WEB", url: "https://github.com/punkave/sanitize-html/issues/29", }, { type: "WEB", url: "https://github.com/apostrophecms/sanitize-html/commit/762fbc7bba389f3f789cc291c1eb2b64f60f2caf", }, { type: "WEB", url: "https://raw.githubusercontent.com/distributedweaknessfiling/cvelist/master/2016/1000xxx/CVE-2016-1000237.json", }, { type: "WEB", url: "https://www.npmjs.com/advisories/135", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", type: "CVSS_V3", }, ], summary: "Cross-Site Scripting in sanitize-html", }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.