First published: Mon Sep 27 2021(Updated: )
datatables.net is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability to inject malicious script into a web page which would be executed in a victim's Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
Credit: report@snyk.io report@snyk.io report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
Datatables Datatables.net | <1.11.3 | |
redhat/datatables.net | <1.11.3 | 1.11.3 |
npm/datatables.net | <1.11.3 | 1.11.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-23445.
The severity rating of CVE-2021-23445 is 7.2 (high).
The package datatables.net before version 1.11.3 is affected by CVE-2021-23445.
CVE-2021-23445 allows remote attackers to inject malicious scripts into web pages, which could be executed in a victim's web browser within the security context of the hosting web server.
To fix CVE-2021-23445, update the datatables.net package to version 1.11.3 or later.