First published: Sat Feb 24 2024(Updated: )
Versions of the package sanitize-html before 2.12.1 are vulnerable to Information Exposure when used on the backend and with the style attribute allowed, allowing enumeration of files in the system (including project dependencies). An attacker could exploit this vulnerability to gather details about the file system structure and dependencies of the targeted server.
Credit: report@snyk.io report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
npm/sanitize-html | <2.12.1 | 2.12.1 |
Punkave Sanitize-html | <2.12.1 | |
Red Hat Fedora | =39 | |
Red Hat Fedora | =40 |
https://github.com/apostrophecms/sanitize-html/commit/c5dbdf77fe8b836d3bf4554ea39edb45281ec0b4
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21501 has a medium severity level due to its potential for information exposure.
To fix CVE-2024-21501, update the sanitize-html package to version 2.12.1 or later.
CVE-2024-21501 affects versions of the sanitize-html package prior to 2.12.1 used in backend applications.
An attacker can exploit CVE-2024-21501 to enumerate files in the system, including project dependencies.
Yes, using sanitize-html with allowed style attributes can increase the risk of CVE-2024-21501 being exploited.