First published: Tue Feb 22 2022(Updated: )
A flaw was found in sanitize-url due to improper sanitization in the sanitizeUrl function. This issue causes vulnerability to Cross-site Scripting in sanitize-url.
Credit: report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/grafana | <0:7.5.15-3.el8 | 0:7.5.15-3.el8 |
redhat/grafana | <0:7.5.15-3.el9 | 0:7.5.15-3.el9 |
Paypal Braintree\/sanitize-url | <6.0.0 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 |
https://github.com/braintree/sanitize-url/pull/40/commits/e5afda45d9833682b705f73fc2c1265d34832183
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-23648 is a vulnerability in the sanitize-url package that allows for cross-site scripting (XSS) attacks.
CVE-2021-23648 has a severity rating of 6.1, which is considered medium.
CVE-2021-23648 allows attackers to perform cross-site scripting (XSS) attacks through the sanitizeUrl function in sanitize-url.
The remedy for CVE-2021-23648 is to upgrade to version 6.0.0 of the sanitize-url package.
You can find more information about CVE-2021-23648 in the bug reports on Bugzilla and the pull request on GitHub.