All versions of the package serve-lite are vulnerable to Cross-site Scripting (XSS) because when it detects a request to a directory, it renders a file listing of all of its contents with links that include the actual file names without any sanitization or output encoding.
References
Link | Resource |
---|---|
https://gist.github.com/lirantal/52debd25284726fcc2eaed9c7512975c | Exploit Third Party Advisory |
https://security.snyk.io/vuln/SNYK-JS-SERVELITE-3149915 | Third Party Advisory |
https://gist.github.com/lirantal/52debd25284726fcc2eaed9c7512975c | Exploit Third Party Advisory |
https://security.snyk.io/vuln/SNYK-JS-SERVELITE-3149915 | Third Party Advisory |
Configurations
History
21 Nov 2024, 06:53
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://gist.github.com/lirantal/52debd25284726fcc2eaed9c7512975c - Exploit, Third Party Advisory | |
References | () https://security.snyk.io/vuln/SNYK-JS-SERVELITE-3149915 - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
Information
Published : 2023-01-26 21:15
Updated : 2025-04-01 15:15
NVD link : CVE-2022-25847
Mitre link : CVE-2022-25847
CVE.ORG link : CVE-2022-25847
JSON object : View
Products Affected
serve-lite_project
- serve-lite
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')