First published: Thu Mar 28 2024(Updated: )
### Impact When the following conditions are met: - Automated CSP headers generation for SSR content is enabled - The web application serves content that can be partially controlled by external users Then it is possible that the CSP headers generation feature might be "allow-listing" malicious injected resources like inlined JS, or references to external malicious scripts. ### Patches Available in version 1.3.0 . ### Workarounds - Do not enable CSP headers generation. - Use it only for dynamically generated content that cannot be controlled by external users in any way. ### References _Are there any links users can visit to find out more?_
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
npm/@kindspells/astro-shield | =1.2.0 | 1.3.0 |
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-29896 is currently under evaluation based on its impact and exploitability.
To fix CVE-2024-29896, ensure that you update your installation of @kindspells/astro-shield to version 1.3.0 or later, or apply the necessary patches for affected versions of IBM Cognos Analytics.
CVE-2024-29896 affects users of the @kindspells/astro-shield package version 1.2.0 and earlier, as well as IBM Cognos Analytics versions up to 12.0.3 and 11.2.4 FP4.
CVE-2024-29896 is caused by automated CSP headers generation for SSR content being enabled in web applications that serve user-controllable content.
Currently, the recommended approach is to update or patch the affected systems as there are no official workarounds available for CVE-2024-29896.