CVE-2024-10491
EUVD-2024-317429.10.2024, 17:15
A vulnerability has been identified in the Express response.links function, allowing for arbitrary resource injection in the Link header when unsanitized data is used. The issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `<>` to preload malicious resources. This vulnerability is especially relevant for dynamic parameters.
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| openjsf | express | 3.0.0 ≤ 𝑥 < 3.21.5 |
𝑥
= Vulnerable software versions
Debian Releases