GHSA-VP4F-WXGW-7X8X
Vulnerability from github – Published: 2023-09-04 16:36 – Updated: 2023-09-04 16:36
VLAI?
Summary
Improper Neutralization of Script in Attributes in @dcl/single-sign-on-client
Details
Impact
Improper input validation in the init function allows arbitrary javascript to be executed using the javascript: prefix
SSO.init('javascript:alert("javascript successfully injected")')
Patches
This vulnerability was patched on version 0.1.0
Workarounds
This vulnerability can be prevented if user input correctly sanitized or there is no user input pass to the init function
Severity ?
7.5 (High)
{
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "@dcl/single-sign-on-client"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.1.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2023-41049"
],
"database_specific": {
"cwe_ids": [
"CWE-79"
],
"github_reviewed": true,
"github_reviewed_at": "2023-09-04T16:36:27Z",
"nvd_published_at": "2023-09-01T20:15:07Z",
"severity": "HIGH"
},
"details": "### Impact\nImproper input validation in the `init` function allows arbitrary javascript to be executed using the `javascript:` prefix\n\n```ts\n SSO.init(\u0027javascript:alert(\"javascript successfully injected\")\u0027)\n```\n\n### Patches\n\nThis vulnerability was patched on version `0.1.0`\n\n### Workarounds\n\nThis vulnerability can be prevented if user input correctly sanitized or there is no user input pass to the `init` function\n",
"id": "GHSA-vp4f-wxgw-7x8x",
"modified": "2023-09-04T16:36:27Z",
"published": "2023-09-04T16:36:27Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/decentraland/single-sign-on-client/security/advisories/GHSA-vp4f-wxgw-7x8x"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41049"
},
{
"type": "WEB",
"url": "https://github.com/decentraland/single-sign-on-client/pull/2"
},
{
"type": "WEB",
"url": "https://github.com/decentraland/single-sign-on-client/commit/bd20ea9533d0cda30809d929db85b1b76cef855a"
},
{
"type": "PACKAGE",
"url": "https://github.com/decentraland/single-sign-on-client"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
],
"summary": "Improper Neutralization of Script in Attributes in @dcl/single-sign-on-client"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…