logo

CVE-2019-18413 class-validator

Package

Manager: npm
Name: class-validator
Vulnerable Version: >=0 <0.14.0

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00114 pctl0.30683

Details

SQL Injection and Cross-site Scripting in class-validator In TypeStack class-validator, `validate()` input validation can be bypassed because certain internal attributes can be overwritten via a conflicting name. Even though there is an optional `forbidUnknownValues` parameter that can be used to reduce the risk of this bypass, this option is not documented and thus most developers configure input validation in the vulnerable default manner. With this vulnerability, attackers can launch SQL Injection or XSS attacks by injecting arbitrary malicious input. The default settings for `forbidUnknownValues` has been changed to `true` in 0.14.0. NOTE: a software maintainer agrees with the "is not documented" finding but suggests that much of the responsibility for the risk lies in a different product.

Metadata

Created: 2021-10-12T16:35:45Z
Modified: 2023-01-11T21:59:18Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/10/GHSA-fj58-h2fr-3pp2/GHSA-fj58-h2fr-3pp2.json
CWE IDs: ["CWE-79", "CWE-89"]
Alternative ID: GHSA-fj58-h2fr-3pp2
Finding: F106
Auto approve: 1