Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1xaGpmLWhtNWotMzM1d84AA483
@urql/next Cross-site Scripting vulnerability
impact
The @urql/next
package is vulnerable to XSS. To exploit this an attacker would need to ensure that the response returns html
tags and that the web-application is using streamed responses (non-RSC). This vulnerability is due to improper escaping of html-like characters in the response-stream.
To fix this vulnerability upgrade to version 1.1.1
Permalink: https://github.com/advisories/GHSA-qhjf-hm5j-335wJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1xaGpmLWhtNWotMzM1d84AA483
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 10 months ago
Updated: 10 months ago
CVSS Score: 7.2
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
Identifiers: GHSA-qhjf-hm5j-335w, CVE-2024-24556
References:
- https://github.com/urql-graphql/urql/security/advisories/GHSA-qhjf-hm5j-335w
- https://nvd.nist.gov/vuln/detail/CVE-2024-24556
- https://github.com/urql-graphql/urql/commit/4b7011b70d5718728ff912d02a4dbdc7f703540d
- https://github.com/advisories/GHSA-qhjf-hm5j-335w
Blast Radius: 0.0
Affected Packages
npm:@urql/next
Dependent packages: 0Dependent repositories: 1
Downloads: 98,684 last month
Affected Version Ranges: < 1.1.1
Fixed in: 1.1.1
All affected versions: 1.0.0, 1.1.0
All unaffected versions: 1.1.1, 1.1.2, 1.1.3