Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1jNGdyLXE5N2ctcHB3Y84AA6gY

In Astro-Shield, setting a correct `integrity` attribute to injected code allows to bypass the allow-lists

Impact

Versions from 1.2.0 to 1.3.1 of Astro-Shield allow to bypass the allow-lists for cross-origin resources by introducing valid integrity attributes to the injected code. This implies that the injected SRI hash would be added to the generated CSP header, which would lead the browser to believe that the injected resource is legit.

To exploit this vulnerability, the attacker needs to first inject code into the rendered pages by exploiting other not-related potential vulnerabilities.

Patches

Version 1.3.2 provides a patch.

Workarounds

References

Are there any links users can visit to find out more?

Permalink: https://github.com/advisories/GHSA-c4gr-q97g-ppwc
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1jNGdyLXE5N2ctcHB3Y84AA6gY
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 1 month ago
Updated: 27 days ago


CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Identifiers: GHSA-c4gr-q97g-ppwc, CVE-2024-30250
References: Repository: https://github.com/kindspells/astro-shield
Blast Radius: 1.0

Affected Packages

npm:@kindspells/astro-shield
Dependent packages: 0
Dependent repositories: 0
Downloads: 755 last month
Affected Version Ranges: >= 1.2.0, < 1.3.2
Fixed in: 1.3.2
All affected versions: 1.2.0, 1.3.0, 1.3.1
All unaffected versions: 0.5.0, 0.5.1, 1.0.1, 1.1.0, 1.3.2, 1.3.3, 1.3.4, 1.3.5, 1.3.6