Description
This affects the package edge.js before 5.3.2. A type confusion vulnerability can be used to bypass input sanitization when the input to be rendered is an array (instead of a string or a SafeValue), even if {{ }} are used.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-1980 | This affects the package edge.js before 5.3.2. A type confusion vulnerability can be used to bypass input sanitization when the input to be rendered is an array (instead of a string or a SafeValue), even if {{ }} are used. |
Github GHSA |
GHSA-55r9-7mf8-m382 | Cross-site Scripting in edge.js |
References
History
No history.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-09-16T22:09:33.398Z
Reserved: 2021-01-08T00:00:00.000Z
Link: CVE-2021-23443
No data.
Status : Modified
Published: 2021-09-21T17:15:09.297
Modified: 2024-11-21T05:51:46.090
Link: CVE-2021-23443
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA