Skip to content

Passing in a non-string 'html' argument can lead to unsanitized output

moderate severity Published Jun 18, 2021 in ericnorris/striptags • Updated Jun 25, 2021

Package

npm striptags (npm)

Affected versions

< 3.2.0

Patched versions

3.2.0

Description

A type-confusion vulnerability can cause striptags to concatenate unsanitized strings when an array-like object is passed in as the html parameter. This can be abused by an attacker who can control the shape of their input, e.g. if query parameters are passed directly into the function.

Impact

XSS

Patches

3.2.0

Workarounds

Ensure that the html parameter is a string before calling the function.

References

@ericnorris ericnorris published the maintainer security advisory Jun 18, 2021

CVE ID

CVE-2021-32696

CVSS Score

3.7 Low
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

Credits