dompurify-3.2.2.tgz: 1 vulnerabilities (highest severity is: 6.1) #9978
Labels
assessment
Pull requests that affect the corresponding module
communication
Pull requests that affect the corresponding module
Mend: dependency security vulnerability
Security vulnerability detected by Mend
programming
Pull requests that affect the corresponding module
Vulnerable Library - dompurify-3.2.2.tgz
DOMPurify is a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. It's written in JavaScript and works in all modern browsers (Safari, Opera (15+), Internet Explorer (10+), Firefox and Chrome - as well as almost anything else usin
Library home page: https://registry.npmjs.org/dompurify/-/dompurify-3.2.2.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/dompurify/package.json
Found in HEAD commit: c9f0c0df3aeb15b9978bd7f10ac66a7913f5a284
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
WS-2024-0017
Vulnerable Library - dompurify-3.2.2.tgz
DOMPurify is a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. It's written in JavaScript and works in all modern browsers (Safari, Opera (15+), Internet Explorer (10+), Firefox and Chrome - as well as almost anything else usin
Library home page: https://registry.npmjs.org/dompurify/-/dompurify-3.2.2.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/dompurify/package.json
Dependency Hierarchy:
Found in HEAD commit: c9f0c0df3aeb15b9978bd7f10ac66a7913f5a284
Found in base branch: develop
Vulnerability Details
Insufficient checks in DOMPurify allows an attacker to bypass sanitizers and execute arbitrary JavaScript code. This issue affects versions before 2.5.8 and 3.x before 3.2.3.
Publish Date: 2024-02-08
URL: WS-2024-0017
CVSS 3 Score Details (6.1)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://seclists.org/oss-sec/2024/q3/234
Release Date: 2024-02-08
Fix Resolution: v9.1.0707
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: