Source: node-express
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for node-express.

CVE-2024-43796[0]:
| Express.js minimalist web framework for node. In express < 4.20.0,
| passing untrusted user input - even after sanitizing it - to
| response.redirect() may execute untrusted code. This issue is
| patched in express 4.20.0.

https://github.com/expressjs/express/security/advisories/GHSA-qw6h-vgh9-j6wx
https://github.com/expressjs/express/commit/54271f69b511fea198471e6ff3400ab805d6b553
 (4.20.0)
                

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-43796
    https://www.cve.org/CVERecord?id=CVE-2024-43796

Please adjust the affected versions in the BTS as needed.

-- 
Pkg-javascript-devel mailing list
Pkg-javascript-devel@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-javascript-devel

Reply via email to