Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLW12amotZ3FxMi1wNGh3

Cross-Site Scripting in react-dom

Affected versions of react-dom are vulnerable to Cross-Site Scripting (XSS). The package fails to validate attribute names in HTML tags which may lead to Cross-Site Scripting in specific scenarios. This may allow attackers to execute arbitrary JavaScript in the victim's browser. To be affected by this vulnerability, the application needs to:

Recommendation

If you are using react-dom 16.0.x, upgrade to 16.0.1 or later.
If you are using react-dom 16.1.x, upgrade to 16.1.2 or later.
If you are using react-dom 16.2.x, upgrade to 16.2.1 or later.
If you are using react-dom 16.3.x, upgrade to 16.3.3 or later.
If you are using react-dom 16.4.x, upgrade to 16.4.2 or later.

Permalink: https://github.com/advisories/GHSA-mvjj-gqq2-p4hw
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLW12amotZ3FxMi1wNGh3
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 6 years ago
Updated: about 1 year ago


CVSS Score: 6.1
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Identifiers: GHSA-mvjj-gqq2-p4hw, CVE-2018-6341
References: Blast Radius: 39.2

Affected Packages

npm:react-dom
Dependent packages: 211,813
Dependent repositories: 2,621,774
Downloads: 107,411,174 last month
Affected Version Ranges: >= 16.4.0, < 16.4.2, >= 16.3.0, < 16.3.3, = 16.2.0, >= 16.1.0, < 16.1.2, = 16.0.0
Fixed in: 16.4.2, 16.3.3, 16.2.1, 16.1.2, 16.0.1
All affected versions: 16.0.0, 16.1.0, 16.1.1, 16.2.0, 16.3.0, 16.3.1, 16.3.2, 16.4.0, 16.4.1
All unaffected versions: 0.1.0, 0.14.0, 0.14.1, 0.14.2, 0.14.3, 0.14.4, 0.14.5, 0.14.6, 0.14.7, 0.14.8, 0.14.9, 0.14.10, 15.0.0, 15.0.1, 15.0.2, 15.1.0, 15.2.0, 15.2.1, 15.3.0, 15.3.1, 15.3.2, 15.4.0, 15.4.1, 15.4.2, 15.5.0, 15.5.1, 15.5.2, 15.5.3, 15.5.4, 15.6.0, 15.6.1, 15.6.2, 15.7.0, 16.0.1, 16.1.2, 16.2.1, 16.3.3, 16.4.2, 16.5.0, 16.5.1, 16.5.2, 16.6.0, 16.6.1, 16.6.2, 16.6.3, 16.7.0, 16.8.0, 16.8.1, 16.8.2, 16.8.3, 16.8.4, 16.8.5, 16.8.6, 16.9.0, 16.10.0, 16.10.1, 16.10.2, 16.11.0, 16.12.0, 16.13.0, 16.13.1, 16.14.0, 17.0.0, 17.0.1, 17.0.2, 18.0.0, 18.1.0, 18.2.0, 18.3.0, 18.3.1