Miggo Logo

CVE-2019-11003: Materialize-css vulnerable to Cross-site Scripting in autocomplete component

6.1

CVSS Score
3.0

Basic Information

EPSS Score
0.45059%
Published
4/9/2019
Updated
8/28/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
materialize-cssnpm<= 1.0.0
@materializecss/materializenpm< 1.1.0-alpha1.1.0-alpha

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from how Materialize's autocomplete component handles user input. Multiple sources (CVE description, GitHub issue #6286, and Snyk report) show the component injects unescaped content via:

  1. The renderItem method that creates suggestion elements using innerHTML
  2. The initialization logic that processes user-supplied data objects without sanitization

The GitHub PR #49 fix introduces textContent usage and an allowUnsafeHTML flag, confirming these were the injection points. The file path is inferred from standard Materialize directory structure and component organization.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*ll v*rsions o* `m*t*ri*liz*-*ss` *r* vuln*r**l* to *ross-Sit* S*riptin*. T** `*uto*ompl*t*` *ompon*nt *o*s not su**i*i*ntly s*nitiz* us*r input, *llowin* *n *tt**k*r to *x**ut* *r*itr*ry J*v*S*ript *o** i* t** m*li*ious input is r*n**r** *y * us*r.

Reasoning

T** vuln*r**ility st*ms *rom *ow M*t*ri*liz*'s *uto*ompl*t* *ompon*nt **n*l*s us*r input. Multipl* sour**s (*V* **s*ription, *it*u* issu* #****, *n* Snyk r*port) s*ow t** *ompon*nt inj**ts un*s**p** *ont*nt vi*: *. T** r*n**rIt*m m*t*o* t**t *r**t*s