First published: Mon Jun 04 2018(Updated: )
Affected versions of `sanitize-html` are vulnerable to cross-site scripting. ## Proof of Concept: `<IMG SRC= onmouseover="alert('XSS');">` produces the following: `<img src="onmouseover="alert('XSS');"" />` This is definitely invalid HTML, but would suggest that it's being interpreted incorrectly by the parser. ## Recommendation Update to version 1.2.3 or later.
Credit: support@hackerone.com support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Punkave Sanitize-html | <=1.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-16017 is classified as a high-severity vulnerability due to its potential for cross-site scripting (XSS) attacks.
CVE-2017-16017 affects versions of sanitize-html up to and including 1.2.2.
To fix CVE-2017-16017, upgrade sanitize-html to version 1.2.3 or later.
CVE-2017-16017 is a cross-site scripting (XSS) vulnerability found in the sanitize-html package.
CVE-2017-16017 can allow attackers to execute arbitrary JavaScript in the context of the user's browser, compromising web application security.