Arbitrary Code Execution
Affecting sanitize-html package, versions <2.0.0-beta
Report new vulnerabilities
Do your applications use this vulnerable package?
Test your applications
Overview
sanitize-html is a library that allows you to clean up user-submitted HTML, preserving whitelisted elements and whitelisted attributes on a per-element basis
Affected versions of this package are vulnerable to Arbitrary Code Execution. Tag transformations which turn an attribute value into a text node using transformTags
could be vulnerable to code execution.
Remediation
Upgrade sanitize-html
to version 2.0.0-beta or higher.
References
CVSS Score
9.4
high severity
-
Attack VectorNetwork
-
Attack ComplexityLow
-
Privileges RequiredNone
-
User InteractionNone
-
ScopeUnchanged
-
ConfidentialityHigh
-
IntegrityHigh
-
AvailabilityLow
- Credit
- mikesamuel
- CWE
- CWE-94
- Snyk ID
- SNYK-JS-SANITIZEHTML-585892
- Disclosed
- 07 Sep, 2020
- Published
- 07 Sep, 2020