CVE-2024-10491
29.10.2024, 17:15
A vulnerability has been identified in the Express response.linksfunction, allowing for arbitrary resource injection in the Linkheader when unsanitized data is used. The issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `<>` to preload malicious resources. This vulnerability is especially relevant for dynamic parameters.
Vendor | Product | Version |
---|---|---|
openjsf | express | 𝑥 ≤ 3.21.4 |
𝑥
= Vulnerable software versions

Debian Releases