yahoo / fetchr

Universal data access layer for web applications.
Other
453 stars 86 forks source link

passing untrusted user input - even after sanitizing it - to SendStream.redirect() may execute untrusted code #532

Closed andrisecops closed 1 month ago

andrisecops commented 1 month ago

passing untrusted user input - even after sanitizing it - to SendStream.redirect() may execute untrusted code

The vulnerability arises when untrusted user input is passed to the SendStream.redirect() function, even after sanitization. This can result in the execution of untrusted code. Successful exploitation of this vulnerability requires the following conditions: 1) The attacker must control the input to response.redirect(), 2) The express framework must not redirect before the template appears, and 3) The browser must not complete redirection before the user clicks on the link in the template. The impact of this vulnerability can lead to XSS attacks, compromising the security and integrity of the application.

CWE-79 CVE-2024-43799

Patches

this issue is patched in fetchr_send 0.19.0

I confirm that this contribution is made under the terms of the license found in the root directory of this repository's source tree and that I have the authority necessary to make this contribution on behalf of its copyright owner.

redonkulus commented 1 month ago

Updated the package via dependabot PR