logo

CVE-2014-9772 validator

Package

Manager: npm
Name: validator
Vulnerable Version: >=0 <2.0.0

Severity

Level: Medium

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00602 pctl0.6857

Details

XSS Filter Bypass via Encoded URL in validator Versions of `validator` prior to 2.0.0 contained an xss filter method that is affected by several filter bypasses. This may result in a cross-site scripting vulnerability. ## Proof of Concept The xss() function removes the word "javascript" when contained inside an attribute. However, it does not properly handle cases where characters have been hex-encoded. As a result, it is possible to build an input that bypasses the filter but which the browser will accept as valid JavaScript. For example: ```<a href="jav&#x61;script:...">abc</a>``` will render as: ```<a href="javascript:...">abc</a>``` ## Recommendation The package author has decided to remove the xss filter functionality in the latest version of this module. If this feature is not currently being used, you are not affected by the vulnerability. If it is being used, updating to the latest version of the module will break your application. In order for affected users to mitigate this vulnerability, it is necessary to use an [alternative package](https://www.npmjs.com/search?q=xss%20filter&page=1&ranking=optimal) that provides similar functionality.

Metadata

Created: 2018-11-06T23:12:49Z
Modified: 2021-09-02T21:06:02Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2018/11/GHSA-79mx-88w7-8f7q/GHSA-79mx-88w7-8f7q.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-79mx-88w7-8f7q
Finding: F008
Auto approve: 1