The issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `<>` to preload malicious resources.
This vulnerability is especially relevant for dynamic parameters.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-3174 | A vulnerability has been identified in the Express response.links function, allowing for arbitrary resource injection in the Link header when unsanitized data is used. The issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `<>` to preload malicious resources. This vulnerability is especially relevant for dynamic parameters. |
Github GHSA |
GHSA-cm5g-3pgc-8rg4 | Express ressource injection |
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 06 Nov 2024 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openjsf
Openjsf express |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:openjsf:express:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openjsf
Openjsf express |
Wed, 30 Oct 2024 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Tue, 29 Oct 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Expressjs
Expressjs express |
|
| CPEs | cpe:2.3:a:expressjs:express:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Expressjs
Expressjs express |
|
| Metrics |
ssvc
|
Tue, 29 Oct 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been identified in the Express response.links function, allowing for arbitrary resource injection in the Link header when unsanitized data is used. The issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `<>` to preload malicious resources. This vulnerability is especially relevant for dynamic parameters. | |
| Title | Preload arbitrary resources by injecting additional `Link` headers | |
| Weaknesses | CWE-74 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: HeroDevs
Published:
Updated: 2024-10-29T19:44:30.890Z
Reserved: 2024-10-29T11:53:00.416Z
Link: CVE-2024-10491
Updated: 2024-10-29T19:44:25.247Z
Status : Analyzed
Published: 2024-10-29T17:15:03.853
Modified: 2026-01-08T21:04:04.757
Link: CVE-2024-10491
OpenCVE Enrichment
No data.
EUVD
Github GHSA