Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-2859 | Express.js minimalist web framework for node. In express < 4.20.0, passing untrusted user input - even after sanitizing it - to response.redirect() may execute untrusted code. This issue is patched in express 4.20.0. |
Github GHSA |
GHSA-qw6h-vgh9-j6wx | express vulnerable to XSS via response.redirect() |
Ubuntu USN |
USN-7581-1 | Express vulnerabilities |
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 13 Feb 2025 00:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat discovery
Redhat openshift |
|
| CPEs | cpe:/a:redhat:openshift:4.17::el9 cpe:/a:redhat:openshift_data_foundation:4.14::el9 cpe:/a:redhat:openshift_data_foundation:4.15::el9 cpe:/o:redhat:discovery:1.0::el9 |
|
| Vendors & Products |
Redhat discovery
Redhat openshift |
Fri, 13 Dec 2024 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat rhboac Hawtio
|
|
| CPEs | cpe:/a:redhat:rhboac_hawtio:4.0.0 | |
| Vendors & Products |
Redhat rhboac Hawtio
|
Thu, 12 Dec 2024 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat openshift Distributed Tracing
|
|
| CPEs | cpe:/a:redhat:openshift_distributed_tracing:3.4::el8 | |
| Vendors & Products |
Redhat openshift Distributed Tracing
|
Tue, 10 Dec 2024 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat rhmt
|
|
| CPEs | cpe:/a:redhat:rhmt:1.8::el8 | |
| Vendors & Products |
Redhat rhmt
|
Thu, 31 Oct 2024 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:openshift_data_foundation:4.17::el9 cpe:/a:redhat:openshift_gitops:1.12::el8 cpe:/a:redhat:openshift_gitops:1.12::el9 |
Wed, 30 Oct 2024 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat openshift Gitops
|
|
| CPEs | cpe:/a:redhat:openshift_gitops:1.13::el8 | |
| Vendors & Products |
Redhat openshift Gitops
|
Tue, 22 Oct 2024 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat network Observ Optr
|
|
| CPEs | cpe:/a:redhat:network_observ_optr:1.7.0::el9 | |
| Vendors & Products |
Redhat network Observ Optr
|
Wed, 16 Oct 2024 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat openshift Data Foundation
|
|
| CPEs | cpe:/a:redhat:openshift_data_foundation:4.16::el9 | |
| Vendors & Products |
Redhat openshift Data Foundation
|
Tue, 15 Oct 2024 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat openshift Serverless
|
|
| CPEs | cpe:/a:redhat:openshift_serverless:1.34::el8 | |
| Vendors & Products |
Redhat openshift Serverless
|
Tue, 08 Oct 2024 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat service Mesh |
|
| CPEs | cpe:/a:redhat:service_mesh:2.6::el8 cpe:/a:redhat:service_mesh:2.6::el9 |
|
| Vendors & Products |
Redhat
Redhat service Mesh |
Fri, 20 Sep 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openjsf
Openjsf express |
|
| CPEs | cpe:2.3:a:openjsf:express:*:*:*:*:*:node.js:*:* cpe:2.3:a:openjsf:express:5.0.0:alpha1:*:*:*:node.js:*:* cpe:2.3:a:openjsf:express:5.0.0:alpha2:*:*:*:node.js:*:* cpe:2.3:a:openjsf:express:5.0.0:alpha3:*:*:*:node.js:*:* cpe:2.3:a:openjsf:express:5.0.0:alpha4:*:*:*:node.js:*:* cpe:2.3:a:openjsf:express:5.0.0:alpha5:*:*:*:node.js:*:* cpe:2.3:a:openjsf:express:5.0.0:alpha6:*:*:*:node.js:*:* cpe:2.3:a:openjsf:express:5.0.0:alpha7:*:*:*:node.js:*:* cpe:2.3:a:openjsf:express:5.0.0:alpha8:*:*:*:node.js:*:* cpe:2.3:a:openjsf:express:5.0.0:beta1:*:*:*:node.js:*:* cpe:2.3:a:openjsf:express:5.0.0:beta2:*:*:*:node.js:*:* cpe:2.3:a:openjsf:express:5.0.0:beta3:*:*:*:node.js:*:* |
|
| Vendors & Products |
Openjsf
Openjsf express |
Tue, 10 Sep 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Tue, 10 Sep 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 10 Sep 2024 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Express.js minimalist web framework for node. In express < 4.20.0, passing untrusted user input - even after sanitizing it - to response.redirect() may execute untrusted code. This issue is patched in express 4.20.0. | |
| Title | express vulnerable to XSS via response.redirect() | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-09-10T15:58:45.956Z
Reserved: 2024-08-16T14:20:37.325Z
Link: CVE-2024-43796
Updated: 2024-09-10T15:58:41.001Z
Status : Analyzed
Published: 2024-09-10T15:15:17.510
Modified: 2024-09-20T16:07:47.997
Link: CVE-2024-43796
OpenCVE Enrichment
No data.
EUVD
Github GHSA
Ubuntu USN