org.webjars.bowergithub.cure53:dompurify@2.2.9 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.webjars.bowergithub.cure53:dompurify package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • C
Prototype Pollution

org.webjars.bowergithub.cure53:dompurify is a DOM-only XSS sanitizer for HTML, MathML and SVG.

Affected versions of this package are vulnerable to Prototype Pollution due to improper checks of the properties during the HTML sanitization process.

How to fix Prototype Pollution?

A fix was pushed into the master branch but not yet published.

[0,)
  • M
Cross-site Scripting (XSS)

org.webjars.bowergithub.cure53:dompurify is a DOM-only XSS sanitizer for HTML, MathML and SVG.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) through the improper sanitization of nested HTML elements in the createDOMPurify function when traversing deeply nested elements. This can be triggered by passing malicious inputs to the sanitize() function without checking their depth.

How to fix Cross-site Scripting (XSS)?

There is no fixed version for org.webjars.bowergithub.cure53:dompurify.

[0,)
  • H
Prototype Pollution

org.webjars.bowergithub.cure53:dompurify is a DOM-only XSS sanitizer for HTML, MathML and SVG.

Affected versions of this package are vulnerable to Prototype Pollution due to improper user input sanitization through the depth-checking mechanism, an attacker can exploit this vulnerability by using special nesting techniques to create a malicious HTML file.

How to fix Prototype Pollution?

There is no fixed version for org.webjars.bowergithub.cure53:dompurify.

[0,)
  • M
Template Injection

org.webjars.bowergithub.cure53:dompurify is a DOM-only XSS sanitizer for HTML, MathML and SVG.

Affected versions of this package are vulnerable to Template Injection in purify.js, due to inconsistencies in the parsing of XML and HTML tags. Executable code can be injected in HTML inside XML CDATA blocks.

How to fix Template Injection?

There is no fixed version for org.webjars.bowergithub.cure53:dompurify.

[0,)