GHSA-VP4F-WXGW-7X8X

Vulnerability from github – Published: 2023-09-04 16:36 – Updated: 2023-09-04 16:36
VLAI?
Summary
Improper Neutralization of Script in Attributes in @dcl/single-sign-on-client
Details

Impact

Improper input validation in the init function allows arbitrary javascript to be executed using the javascript: prefix

    SSO.init('javascript:alert("javascript successfully injected")')

Patches

This vulnerability was patched on version 0.1.0

Workarounds

This vulnerability can be prevented if user input correctly sanitized or there is no user input pass to the init function

Show details on source website

{
  "affected": [
    {
      "package": {
        "ecosystem": "npm",
        "name": "@dcl/single-sign-on-client"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0.1.0"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "aliases": [
    "CVE-2023-41049"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-79"
    ],
    "github_reviewed": true,
    "github_reviewed_at": "2023-09-04T16:36:27Z",
    "nvd_published_at": "2023-09-01T20:15:07Z",
    "severity": "HIGH"
  },
  "details": "### Impact\nImproper input validation in the `init` function allows arbitrary javascript to be executed using  the `javascript:` prefix\n\n```ts\n    SSO.init(\u0027javascript:alert(\"javascript successfully injected\")\u0027)\n```\n\n### Patches\n\nThis vulnerability was patched on version `0.1.0`\n\n### Workarounds\n\nThis vulnerability can be prevented if user input correctly sanitized or there is no user input pass to the `init` function\n",
  "id": "GHSA-vp4f-wxgw-7x8x",
  "modified": "2023-09-04T16:36:27Z",
  "published": "2023-09-04T16:36:27Z",
  "references": [
    {
      "type": "WEB",
      "url": "https://github.com/decentraland/single-sign-on-client/security/advisories/GHSA-vp4f-wxgw-7x8x"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41049"
    },
    {
      "type": "WEB",
      "url": "https://github.com/decentraland/single-sign-on-client/pull/2"
    },
    {
      "type": "WEB",
      "url": "https://github.com/decentraland/single-sign-on-client/commit/bd20ea9533d0cda30809d929db85b1b76cef855a"
    },
    {
      "type": "PACKAGE",
      "url": "https://github.com/decentraland/single-sign-on-client"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
      "type": "CVSS_V3"
    }
  ],
  "summary": "Improper Neutralization of Script in Attributes in @dcl/single-sign-on-client"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…