Cross-site Scripting (XSS) possible due to improper sanitisation of `href` attributes on `<a>` tags
Package
Affected versions
= 1.10.0
>= 1.9.0, < 1.9.2
>= 1.8.0, < 1.8.3
>= 1.7.0, < 1.7.2
>= 1.6.0, < 1.6.3
>= 1.5.0, < 1.5.3
< 1.4.2
Patched versions
1.10.1
1.9.2
1.8.3
1.7.2
1.6.3
1.5.3
1.4.2
Description
Published to the GitHub Advisory Database
Apr 17, 2024
Reviewed
Apr 17, 2024
Published by the National Vulnerability Database
Apr 17, 2024
Last updated
Apr 19, 2024
Summary
There is a potential cross-site scripting (XSS) vulnerability that can be exploited via maliciously crafted user data.
Our filter to detect and prevent the use of the
javascript:
URL scheme in thehref
attribute of an<a>
tag could be bypassed with tab\t
or newline\n
characters between the characters of the protocol, e.g.java\tscript:
.Impact
If you render an
<a>
tag with anhref
attribute set to a user-provided link, that link could potentially execute JavaScript when clicked by another user.Mitigation
The best way to mitigate this vulnerability is to update to one of the following versions:
Workarounds
Configuring a Content Security Policy that does not allow
unsafe-inline
would effectively prevent this vulnerability from being exploited.References