Source: node-serialize-javascript Version: 6.0.1-1 Severity: important Tags: security upstream Forwarded: https://github.com/yahoo/serialize-javascript/pull/173 X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi, The following vulnerability was published for node-serialize-javascript. CVE-2024-11831[0]: | A flaw was found in npm-serialize-javascript. The vulnerability | occurs because the serialize-javascript module does not properly | sanitize certain inputs, such as regex or other JavaScript object | types, allowing an attacker to inject malicious code. This code | could be executed when deserialized by a web browser, causing Cross- | site scripting (XSS) attacks. This issue is critical in environments | where serialized data is sent to web clients, potentially | compromising the security of the website or web application using | this package. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2024-11831 https://www.cve.org/CVERecord?id=CVE-2024-11831 [1] https://github.com/yahoo/serialize-javascript/pull/173 [2] https://github.com/yahoo/serialize-javascript/commit/f27d65d3de42affe2aac14607066c293891cec4e Please adjust the affected versions in the BTS as needed. Regards, Salvatore