Vulnerability CVE-2021-32696


Published: 2021-06-18

Description:
The npm package "striptags" is an implementation of PHP's strip_tags in Typescript. In striptags before version 3.2.0, a type-confusion vulnerability can cause `striptags` to concatenate unsanitized strings when an array-like object is passed in as the `html` parameter. This can be abused by an attacker who can control the shape of their input, e.g. if query parameters are passed directly into the function. This can lead to a XSS.

Type:

CWE-843

(Access of Resource Using Incompatible Type ('Type Confusion'))

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Striptags project -> Striptags 

 References:
https://github.com/ericnorris/striptags/commit/f252a6b0819499cd65403707ebaf5cc925f2faca
https://www.npmjs.com/package/striptags
https://github.com/ericnorris/striptags/security/advisories/GHSA-qxg5-2qff-p49r
https://github.com/ericnorris/striptags/releases/tag/v3.2.0

Copyright 2024, cxsecurity.com

 

Back to Top