First published: Mon Dec 31 2018(Updated: )
Affected versions of `react-dom` are vulnerable to Cross-Site Scripting (XSS). The package fails to validate attribute names in HTML tags which may lead to Cross-Site Scripting in specific scenarios. This may allow attackers to execute arbitrary JavaScript in the victim's browser. To be affected by this vulnerability, the application needs to: - be a server-side React app - be rendered to HTML using `ReactDOMServer` - include an attribute name from user input in an HTML tag ## Recommendation If you are using `react-dom` 16.0.x, upgrade to 16.0.1 or later. If you are using `react-dom` 16.1.x, upgrade to 16.1.2 or later. If you are using `react-dom` 16.2.x, upgrade to 16.2.1 or later. If you are using `react-dom` 16.3.x, upgrade to 16.3.3 or later. If you are using `react-dom` 16.4.x, upgrade to 16.4.2 or later.
Credit: cve-assign@fb.com cve-assign@fb.com
Affected Software | Affected Version | How to fix |
---|---|---|
npm/react-dom | >=16.4.0<16.4.2 | 16.4.2 |
npm/react-dom | >=16.3.0<16.3.3 | 16.3.3 |
npm/react-dom | =16.2.0 | 16.2.1 |
npm/react-dom | >=16.1.0<16.1.2 | 16.1.2 |
Facebook React | >=16.0.0<16.0.1 | |
Facebook React | >=16.1.0<16.1.2 | |
Facebook React | >=16.2.0<16.2.1 | |
Facebook React | >=16.3.0<16.3.3 | |
Facebook React | >=16.4.0<16.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.