CVE-2023-2142 – nunjucks
Package
Manager: npm
Name: nunjucks
Vulnerable Version: >=0 <3.2.4
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
EPSS: 0.001 pctl0.28273
Details
Nunjucks autoescape bypass leads to cross site scripting ### Impact In Nunjucks versions prior to version 3.2.4, it was possible to bypass the restrictions which are provided by the autoescape functionality. If there are two user-controlled parameters on the same line used in the views, it was possible to inject cross site scripting payloads using the backslash `\` character. #### Example If the user-controlled parameters were used in the views similar to the following: ``` <script> let testObject = { lang: '{{ lang }}', place: '{{ place }}' }; </script> ``` It is possible to inject XSS payload using the below parameters: ``` https://<application-url>/?lang=jp\&place=};alert(document.domain)// ``` ### Patches The issue was patched in version 3.2.4. ### References - https://bugzilla.mozilla.org/show_bug.cgi?id=1825980
Metadata
Created: 2023-04-20T21:19:24Z
Modified: 2024-11-26T18:54:25Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/04/GHSA-x77j-w7wf-fjmw/GHSA-x77j-w7wf-fjmw.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-x77j-w7wf-fjmw
Finding: F008
Auto approve: 1