Versions of the package sanitize-html before 2.12.1 are vulnerable to Information Exposure when used on the backend and with the style attribute allowed, allowing enumeration of files in the system (including project dependencies). An attacker could exploit this vulnerability to gather details about the file system structure and dependencies of the targeted server.
References
Configurations
History
25 Apr 2025, 19:37
Type | Values Removed | Values Added |
---|---|---|
First Time |
Apostrophecms
Fedoraproject Fedoraproject fedora Apostrophecms sanitize-html |
|
CPE | cpe:2.3:a:apostrophecms:sanitize-html:*:*:*:*:*:node.js:*:* cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:* |
|
References | () https://gist.github.com/Slonser/8b4d061abe6ee1b2e10c7242987674cf - Exploit, Third Party Advisory | |
References | () https://github.com/apostrophecms/apostrophe/discussions/4436 - Issue Tracking | |
References | () https://github.com/apostrophecms/sanitize-html/commit/c5dbdf77fe8b836d3bf4554ea39edb45281ec0b4 - Patch | |
References | () https://github.com/apostrophecms/sanitize-html/pull/650 - Patch | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EB5JPYRCTS64EA5AMV3INHDPI6I4AW7/ - Mailing List | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P4I5X6V3LYUNBMZ5YOW4BV427TH3IK4S/ - Mailing List | |
References | () https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6276557 - Exploit, Third Party Advisory | |
References | () https://security.snyk.io/vuln/SNYK-JS-SANITIZEHTML-6256334 - Exploit, Third Party Advisory |
Information
Published : 2024-02-24 05:15
Updated : 2025-04-25 19:37
NVD link : CVE-2024-21501
Mitre link : CVE-2024-21501
CVE.ORG link : CVE-2024-21501
JSON object : View
Products Affected
fedoraproject
- fedora
apostrophecms
- sanitize-html