ApostropheCMS sanitize-html 2.2.0 for Node.js

CPE Details

ApostropheCMS sanitize-html 2.2.0 for Node.js
2.2.0
2021-02-08
17h55 +00:00
2021-02-08
17h55 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:apostrophecms:sanitize-html:2.2.0:*:*:*:*:node.js:*:*

Informations

Vendor

apostrophecms

Product

sanitize-html

Version

2.2.0

Target Software

node.js

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2024-21501 2024-02-24 05h00 +00:00 Versions of the package sanitize-html before 2.12.1 are vulnerable to Information Exposure when used on the backend and with the style attribute allowed, allowing enumeration of files in the system (including project dependencies). An attacker could exploit this vulnerability to gather details about the file system structure and dependencies of the targeted server.
5.3
Medium
CVE-2022-25887 2022-08-30 05h00 +00:00 The package sanitize-html before 2.7.1 are vulnerable to Regular Expression Denial of Service (ReDoS) due to insecure global regular expression replacement logic of HTML comment removal.
7.5
High
CVE-2021-26540 2021-02-08 15h16 +00:00 Apostrophe Technologies sanitize-html before 2.3.2 does not properly validate the hostnames set by the "allowedIframeHostnames" option when the "allowIframeRelativeUrls" is set to true, which allows attackers to bypass hostname whitelist for iframe element, related using an src value that starts with "/\\example.com".
5.3
Medium
CVE-2021-26539 2021-02-08 15h16 +00:00 Apostrophe Technologies sanitize-html before 2.3.1 does not properly handle internationalized domain name (IDN) which could allow an attacker to bypass hostname whitelist validation set by the "allowedIframeHostnames" option.
5.3
Medium