Miggo Logo

CVE-2019-25155:
DOMPurify Open Redirect vulnerability

6.1

CVSS Score
3.1

Basic Information

EPSS Score
0.47482%
Published
11/14/2023
Updated
11/15/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
dompurifynpm< 1.0.111.0.11

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the demo's afterSanitizeElements hook in hooks-target-blank-demo.html. This hook added 'target="_blank"' to links but did not include the 'rel="noopener noreferrer"' attribute, which is critical to prevent reverse tabnabbing. The patch explicitly adds this attribute in the same hook, confirming the vulnerable code location. The core DOMPurify library is not inherently vulnerable; the issue was specific to the demo's example implementation.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*OMPuri*y ***or* *.*.** *llows r*v*rs* t**n***in* in **mos/*ooks-t*r**t-*l*nk-**mo.*tml ****us* links l**k * 'r*l="noop*n*r nor***rr*r"' *ttri*ut*.

Reasoning

T** vuln*r**ility st*ms *rom t** **mo's `**t*rS*nitiz**l*m*nts` *ook in `*ooks-t*r**t-*l*nk-**mo.*tml`. T*is *ook ***** 't*r**t="_*l*nk"' to links *ut *i* not in*lu** t** 'r*l="noop*n*r nor***rr*r"' *ttri*ut*, w*i** is *riti**l to pr*v*nt r*v*rs* t**