Vulnerability Details : CVE-2023-23630
Eta is an embedded JS templating engine that works inside Node, Deno, and the browser. XSS attack - anyone using the Express API is impacted. The problem has been resolved. Users should upgrade to version 2.0.0. As a workaround, don't pass user supplied things directly to `res.render`.
Vulnerability category: Cross site scripting (XSS)
Products affected by CVE-2023-23630
- cpe:2.3:a:eta.js:eta:*:*:*:*:*:node.js:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-23630
0.14%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 31 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-23630
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.1
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
2.8
|
2.7
|
NIST | |
8.6
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H |
3.9
|
4.7
|
GitHub, Inc. |
CWE ids for CVE-2023-23630
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: security-advisories@github.com (Primary)
References for CVE-2023-23630
-
https://github.com/eta-dev/eta/commit/5651392462ee0ff19d77c8481081a99e5b9138dd
Don't use data object for Eta configuration (#214) · eta-dev/eta@5651392 · GitHubPatch;Third Party Advisory
-
https://github.com/eta-dev/eta/releases/tag/v2.0.0
Release Version 2.0.0 · eta-dev/eta · GitHubRelease Notes;Third Party Advisory
-
https://github.com/eta-dev/eta/security/advisories/GHSA-xrh7-m5pp-39r6
XSS Attack with Express API · Advisory · eta-dev/eta · GitHubThird Party Advisory
Jump to