CVE-2021-32696

The npm package "striptags" is an implementation of PHP's strip_tags in Typescript. In striptags before version 3.2.0, a type-confusion vulnerability can cause `striptags` to concatenate unsanitized strings when an array-like object is passed in as the `html` parameter. This can be abused by an attacker who can control the shape of their input, e.g. if query parameters are passed directly into the function. This can lead to a XSS.
Configurations

Configuration 1 (hide)

cpe:2.3:a:striptags_project:striptags:*:*:*:*:*:node.js:*:*

History

24 Jun 2021, 19:20

Type Values Removed Values Added
References (MISC) https://www.npmjs.com/package/striptags - (MISC) https://www.npmjs.com/package/striptags - Product, Third Party Advisory
References (CONFIRM) https://github.com/ericnorris/striptags/security/advisories/GHSA-qxg5-2qff-p49r - (CONFIRM) https://github.com/ericnorris/striptags/security/advisories/GHSA-qxg5-2qff-p49r - Third Party Advisory
References (MISC) https://github.com/ericnorris/striptags/commit/f252a6b0819499cd65403707ebaf5cc925f2faca - (MISC) https://github.com/ericnorris/striptags/commit/f252a6b0819499cd65403707ebaf5cc925f2faca - Patch, Third Party Advisory
References (MISC) https://github.com/ericnorris/striptags/releases/tag/v3.2.0 - (MISC) https://github.com/ericnorris/striptags/releases/tag/v3.2.0 - Third Party Advisory
CWE CWE-843
CPE cpe:2.3:a:striptags_project:striptags:*:*:*:*:*:node.js:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 5.3

18 Jun 2021, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-06-18 20:15

Updated : 2023-12-10 13:55


NVD link : CVE-2021-32696

Mitre link : CVE-2021-32696

CVE.ORG link : CVE-2021-32696


JSON object : View

Products Affected

striptags_project

  • striptags
CWE
CWE-843

Access of Resource Using Incompatible Type ('Type Confusion')

CWE-241

Improper Handling of Unexpected Data Type

CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')