Miggo Logo

CVE-2023-0410: @builder.io/qwik vulnerable to Cross-site Scripting

6.1

CVSS Score
3.1

Basic Information

EPSS Score
0.36739%
Published
1/20/2023
Updated
1/26/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
@builder.io/qwiknpm< 0.16.20.16.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from two key issues in SSR rendering: 1) Class attribute values were inserted without proper escaping (fixed by adding escapeAttr()), and 2) Attribute names weren't validated against unsafe characters (fixed by adding isSSRUnsafeAttr()). The renderNode function contained both vulnerable code paths - direct classStr insertion and lack of attribute name validation. The escapeAttr function's missing application to class attributes left a security gap, even though the function itself was properly implemented.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

@*uil**r.io/qwik prior to v*rsion *.**.* is vuln*r**l* to *ross-sit* s*riptin* *u* to *ttri*ut* n*m*s *n* t** *l*ss *ttri*ut* v*lu*s not **in* prop*rly **n*l**.

Reasoning

T** vuln*r**ility st*mm** *rom two k*y issu*s in SSR r*n**rin*: *) `*l*ss` *ttri*ut* v*lu*s w*r* ins*rt** wit*out prop*r *s**pin* (*ix** *y ***in* `*s**p**ttr()`), *n* *) *ttri*ut* n*m*s w*r*n't v*li**t** ***inst uns*** ***r**t*rs (*ix** *y ***in* `i