ApostropheCMS Sanitize-html 1.19.2 for Node.js

CPE Details

ApostropheCMS Sanitize-html 1.19.2 for Node.js
1.19.2
2020-01-27
12h59 +00:00
2020-01-27
12h59 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:apostrophecms:sanitize-html:1.19.2:*:*:*:*:node.js:*:*

Informations

Vendor

apostrophecms

Product

sanitize-html

Version

1.19.2

Target Software

node.js

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2024-21501 2024-02-24 05h00 +00:00 Versions of the package sanitize-html before 2.12.1 are vulnerable to Information Exposure when used on the backend and with the style attribute allowed, allowing enumeration of files in the system (including project dependencies). An attacker could exploit this vulnerability to gather details about the file system structure and dependencies of the targeted server.
5.3
Moyen
CVE-2022-25887 2022-08-30 05h00 +00:00 The package sanitize-html before 2.7.1 are vulnerable to Regular Expression Denial of Service (ReDoS) due to insecure global regular expression replacement logic of HTML comment removal.
7.5
Haute
CVE-2021-26540 2021-02-08 15h16 +00:00 Apostrophe Technologies sanitize-html before 2.3.2 does not properly validate the hostnames set by the "allowedIframeHostnames" option when the "allowIframeRelativeUrls" is set to true, which allows attackers to bypass hostname whitelist for iframe element, related using an src value that starts with "/\\example.com".
5.3
Moyen
CVE-2021-26539 2021-02-08 15h16 +00:00 Apostrophe Technologies sanitize-html before 2.3.1 does not properly handle internationalized domain name (IDN) which could allow an attacker to bypass hostname whitelist validation set by the "allowedIframeHostnames" option.
5.3
Moyen