serve-static vulnerable to template injection that can lead to XSS
Low severity
GitHub Reviewed
Published
Sep 10, 2024
in
expressjs/serve-static
•
Updated Nov 18, 2024
Package
Affected versions
< 1.16.0
>= 2.0.0, < 2.1.0
Patched versions
1.16.0
2.1.0
Description
Published by the National Vulnerability Database
Sep 10, 2024
Published to the GitHub Advisory Database
Sep 10, 2024
Reviewed
Sep 10, 2024
Last updated
Nov 18, 2024
Impact
passing untrusted user input - even after sanitizing it - to
redirect()
may execute untrusted codePatches
this issue is patched in serve-static 1.16.0
Workarounds
users are encouraged to upgrade to the patched version of express, but otherwise can workaround this issue by making sure any untrusted inputs are safe, ideally by validating them against an explicit allowlist
Details
successful exploitation of this vector requires the following:
References