Name | CVE-2024-21501 |
Description | Versions of the package sanitize-html before 2.12.1 are vulnerable to Information Exposure when used on the backend and with the style attribute allowed, allowing enumeration of files in the system (including project dependencies). An attacker could exploit this vulnerability to gather details about the file system structure and dependencies of the targeted server. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1064808 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
node-sanitize-html (PTS) | bookworm | 2.8.0+~2.6.2-1 | vulnerable |
sid, trixie | 2.13.1+~2.13.0-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
node-sanitize-html | source | (unstable) | 2.13.0+~2.11.0-1 | 1064808 |
[bookworm] - node-sanitize-html <no-dsa> (Minor issue)
https://github.com/apostrophecms/sanitize-html/pull/650
https://gist.github.com/Slonser/8b4d061abe6ee1b2e10c7242987674cf
https://github.com/apostrophecms/apostrophe/discussions/4436
https://github.com/apostrophecms/sanitize-html/commit/075499d1b98c387f4200fd59972ca9b15796b51b (2.12.1)
https://github.com/apostrophecms/sanitize-html/commit/1e2294c8001ce07c89448e03289818da631795ba (2.12.1)