CVE-2022-21169
7.3HIGHThe package express-xss-sanitizer before 1.1.3 are vulnerable to Prototype Pollution via the allowedTags attribute, allowing the attacker to bypass xss sanitization.
Опубликовано: 9/26/2022Обновлено: 5/21/2025
Описание
The package express-xss-sanitizer before 1.1.3 are vulnerable to Prototype Pollution via the allowedTags attribute, allowing the attacker to bypass xss sanitization.
ИИ-АнализНа базе ИИ
Затронутые продукты
express_xss_sanitizer_projectexpress_xss_sanitizer
Ссылки
- https://github.com/AhmedAdelFahim/express-xss-sanitizer/commit/3bf8aaaf4dbb1c209dcb8d87a82711a54c1ab39aPatchThird Party Advisory
- https://github.com/AhmedAdelFahim/express-xss-sanitizer/issues/4ExploitIssue TrackingThird Party Advisory
- https://runkit.com/embed/w306l6zfm7tuPatchThird Party AdvisoryURL Repurposed
- https://security.snyk.io/vuln/SNYK-JS-EXPRESSXSSSANITIZER-3027443ExploitThird Party Advisory
- https://github.com/AhmedAdelFahim/express-xss-sanitizer/commit/3bf8aaaf4dbb1c209dcb8d87a82711a54c1ab39aPatchThird Party Advisory
- https://github.com/AhmedAdelFahim/express-xss-sanitizer/issues/4ExploitIssue TrackingThird Party Advisory
- https://runkit.com/embed/w306l6zfm7tuPatchThird Party AdvisoryURL Repurposed
- https://security.snyk.io/vuln/SNYK-JS-EXPRESSXSSSANITIZER-3027443ExploitThird Party Advisory