Miggo Logo

CVE-2023-26487: Vega has Cross-site Scripting vulnerability in `lassoAppend` function

6.1

CVSS Score
3.1

Basic Information

EPSS Score
0.37505%
Published
3/2/2023
Updated
3/13/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
veganpm< 5.23.05.23.0
vega-functionsnpm< 5.13.15.13.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems directly from lassoAppend's lack of type checking on its first argument. The commit diff shows the fix adds array type enforcement via 'vega-util' and replaces push() with array spread syntax. The PoC demonstrates exploitation by passing an object with a malicious push property pointing to event.view functions. This function's direct interaction with untrusted input and unsafe push operation makes it the clear entry point for XSS.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry V***'s `l*sso*pp*n*` *un*tion: `l*sso*pp*n*` ****pts * *r*um*nts *n* int*rn*lly invok*s `pus*` *un*tion on t** *st *r*um*nt sp**i*yin* *rr*y *onsistin* o* *n* *n* *r* *r*um*nts *s `pus*` **ll *r*um*nt. T** typ* o* t** *st *r*um*nt is sup

Reasoning

T** vuln*r**ility st*ms *ir**tly *rom l*sso*pp*n*'s l**k o* typ* ****kin* on its *irst *r*um*nt. T** *ommit *i** s*ows t** *ix ***s *rr*y typ* *n*or**m*nt vi* 'v***-util' *n* r*pl***s pus*() wit* *rr*y spr*** synt*x. T** Po* **monstr*t*s *xploit*tion
CVE-2023-26487: Vega lassoAppend Function XSS | Miggo