CVE-2024-43370

gettext.js is a GNU gettext port for node and the browser. There is a cross-site scripting (XSS) injection if `.po` dictionary definition files are corrupted. This vulnerability has been patched in version 2.0.3. As a workaround, control the origin of the definition catalog to prevent the use of this flaw in the definition of plural forms.
Cross-site Scripting
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.2 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
GitHub_MCNA
7.2 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
CISA-ADPADP
---
---
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 40%
Debian logo
Debian Releases
Debian Product
Codename
gettext.js
bullseye
0.7.0-2+deb11u1
fixed
bookworm
0.7.0-3+deb12u1
fixed
trixie
0.7.0-4
fixed
sid
0.7.0-4
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
gettext.js
plucky
not-affected
oracular
not-affected
noble
needs-triage
jammy
needs-triage
focal
needs-triage
bionic
needs-triage