GHSA-rv3x-xq3r-8j9h

Suggest an improvement
Source
https://github.com/advisories/GHSA-rv3x-xq3r-8j9h
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/06/GHSA-rv3x-xq3r-8j9h/GHSA-rv3x-xq3r-8j9h.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-rv3x-xq3r-8j9h
Aliases
Published
2023-06-09T19:32:32Z
Modified
2023-11-08T04:06:19.190723Z
Summary
LeafKit allows XSS with untrusted user input
Details

Impact

This affects anyone passing unsanitised data to Leaf's variable tags. Before this fix, Leaf would not escape any strings passed to tags as variables. If an attacker managed to find a variable that was rendered with their unsanitised data, they could inject scripts into a generated Leaf page, which could enable XSS attacks if other mitigations such as a Content Security Policy were not enabled.

Patches

This has been patched in 1.3.0

Workarounds

Sanitise any untrusted input before passing it to Leaf and enable a CSP to block inline script and CSS data.

References

https://github.com/vapor/leaf-kit-ghsa-rv3x-xq3r-8j9h/pull/1

For more information

If you have any questions or comments about this advisory: * Open an issue in Leaf Kit * Email us at security@vapor.codes

References

Affected packages

SwiftURL / github.com/vapor/leaf-kit

Package

Name
github.com/vapor/leaf-kit
Purl
pkg:swift/github.com/vapor/leaf-kit

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.0