@dcl/single-sign-on-client is an open source npm library which deals with single sign on authentication flows. Improper input validation in the `init` function allows arbitrary javascript to be executed using the `javascript:` prefix. This vulnerability has been patched on version `0.1.0`. Users are advised to upgrade. Users unable to upgrade should limit untrusted user input to the `init` function.
References
Configurations
History
21 Nov 2024, 08:20
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
References | () https://github.com/decentraland/single-sign-on-client/commit/bd20ea9533d0cda30809d929db85b1b76cef855a - Patch | |
References | () https://github.com/decentraland/single-sign-on-client/security/advisories/GHSA-vp4f-wxgw-7x8x - Vendor Advisory |
Information
Published : 2023-09-01 20:15
Updated : 2024-11-21 08:20
NVD link : CVE-2023-41049
Mitre link : CVE-2023-41049
CVE.ORG link : CVE-2023-41049
JSON object : View
Products Affected
decentraland
- single_sign_on_client
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')