org.webjars.npm:dompurify@2.0.5 vulnerabilities

  • latest version

    3.2.1

  • latest non vulnerable version

  • first published

    6 years ago

  • latest version published

    1 months ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the org.webjars.npm:dompurify package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • C
    Prototype Pollution

    org.webjars.npm:dompurify is a DOM-only XSS sanitizer for HTML, MathML and SVG.

    Affected versions of this package are vulnerable to Prototype Pollution due to improper checks of the properties during the HTML sanitization process.

    How to fix Prototype Pollution?

    Upgrade org.webjars.npm:dompurify to version 2.4.3 or higher.

    [,2.4.3)
    • M
    Cross-site Scripting (XSS)

    org.webjars.npm:dompurify is a DOM-only XSS sanitizer for HTML, MathML and SVG.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) through the improper sanitization of nested HTML elements in the createDOMPurify function when traversing deeply nested elements. This can be triggered by passing malicious inputs to the sanitize() function without checking their depth.

    How to fix Cross-site Scripting (XSS)?

    Upgrade org.webjars.npm:dompurify to version 2.5.0, 3.1.3 or higher.

    [,2.5.0)[3.0.0,3.1.3)
    • H
    Prototype Pollution

    org.webjars.npm:dompurify is a DOM-only XSS sanitizer for HTML, MathML and SVG.

    Affected versions of this package are vulnerable to Prototype Pollution due to improper user input sanitization through the depth-checking mechanism, an attacker can exploit this vulnerability by using special nesting techniques to create a malicious HTML file.

    How to fix Prototype Pollution?

    Upgrade org.webjars.npm:dompurify to version 2.5.6, 3.1.4 or higher.

    [,2.5.6)[3.0.0,3.1.4)
    • M
    Template Injection

    org.webjars.npm:dompurify is a DOM-only XSS sanitizer for HTML, MathML and SVG.

    Affected versions of this package are vulnerable to Template Injection in purify.js, due to inconsistencies in the parsing of XML and HTML tags. Executable code can be injected in HTML inside XML CDATA blocks.

    How to fix Template Injection?

    Upgrade org.webjars.npm:dompurify to version 2.5.0, 3.1.0 or higher.

    [,2.5.0)[3.0.1,3.1.0)
    • M
    Cross-site Scripting (XSS)

    org.webjars.npm:dompurify is a DOM-only XSS sanitizer for HTML, MathML and SVG.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS). This is due to a bypass of a previous XSS vulnerability.

    How to fix Cross-site Scripting (XSS)?

    Upgrade org.webjars.npm:dompurify to version 2.2.6 or higher.

    [,2.2.6)
    • M
    Cross-site Scripting (XSS)

    org.webjars.npm:dompurify is a DOM-only XSS sanitizer for HTML, MathML and SVG.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) when converting from SVG namespace.

    How to fix Cross-site Scripting (XSS)?

    Upgrade org.webjars.npm:dompurify to version 2.2.6 or higher.

    [0,2.2.6)
    • M
    Cross-site Scripting (XSS)

    org.webjars.npm:dompurify is a DOM-only XSS sanitizer for HTML, MathML and SVG.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS). This occurs because a serialize-parse roundtrip does not necessarily return the original DOM tree, and a namespace can change from HTML to MathML, as demonstrated by nesting of FORM elements.

    How to fix Cross-site Scripting (XSS)?

    Upgrade org.webjars.npm:dompurify to version 2.2.0 or higher.

    [,2.2.0)