Content Injection due to quoteless attributes Affecting mustache Open this link in a new tab package, versions [,2.2.1)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.Test your applications
14 Dec 2015
14 Dec 2015
Matias P. Brutti
Introduced: 14 Dec 2015CWE-79 Open this link in a new tab
When using attributes without quotes in a mustache template, an attacker can manipulate the input to introduce additional attributes, potentially executing code. This may lead to a Cross-site Scripting (XSS) vulnerability, assuming an attacker can influence the value entered into the template. If the mustache template is used to render user-generated content, this vulnerability may escalate to a persistent XSS vulnerability.
For example, assume mustache was used to display user comments, using the following template:
If an attacker spoofed his email address and provided the following value:
The resulting HTML would be:
<a email@example.com onload=alert(document.cookie)>Evil Wizard</a><pre>Busted!</pre>