Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1oNjg1LTgzdzQtM3BoM84AAxwf
iziModal Cross-site Scripting vulnerability
iziModal is a modal plugin with jQuery. Versions prior to 1.6.1 are vulnerable to cross-site scripting (XSS) when handling untrusted modal titles. An attacker who is able to influence the field title
when creating a iziModal
instance is able to supply arbitrary html
or javascript
code that will be rendered in the context of a user, potentially leading to XSS
. Version 1.6.1 contains a patch for this issue
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1oNjg1LTgzdzQtM3BoM84AAxwf
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 1 year ago
Updated: about 1 year ago
CVSS Score: 6.1
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Identifiers: GHSA-h685-83w4-3ph3, CVE-2021-32860
References:
- https://nvd.nist.gov/vuln/detail/CVE-2021-32860
- https://github.com/marcelodolza/iziModal/issues/249
- https://github.com/marcelodolza/iziModal/commit/01728ac52bac5c1b4512087dafe0ad8b091fdc9e
- https://securitylab.github.com/advisories/GHSL-2021-1044_iziModal/
- https://github.com/advisories/GHSA-h685-83w4-3ph3
Blast Radius: 11.9
Affected Packages
npm:izimodal
Dependent packages: 4Dependent repositories: 90
Downloads: 2,700 last month
Affected Version Ranges: < 1.6.1
Fixed in: 1.6.1
All affected versions: 1.1.0, 1.2.2, 1.3.0, 1.3.1, 1.3.2, 1.3.3, 1.4.0, 1.4.1, 1.4.2, 1.5.0, 1.5.1, 1.6.0
All unaffected versions: 1.6.1