Miggo Logo

CVE-2024-21485: Dash apps vulnerable to Cross-site Scripting

6.5

CVSS Score
3.1

Basic Information

EPSS Score
0.64794%
Published
2/2/2024
Updated
9/16/2024
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
dash-core-componentsnpm< 2.13.02.13.0
dashpip< 2.15.02.15.0
dash-html-componentsnpm< 2.0.162.0.16
dash-html-componentspip< 2.0.02.0.0
dash-core-componentspip< 2.0.02.0.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from unsanitized href/action/src attributes in multiple components. The commit diff shows: 1) In Link.react.js, href was directly used without validation before adding @braintree/sanitize-url. 2) generate-components.js was modified to add sanitization for multiple HTML elements' attributes, indicating these were previously vulnerable. Both locations handled user-controlled URL values without proper neutralization of JavaScript URIs, enabling XSS when malicious values were stored and rendered.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

V*rsions o* t** p**k*** **s*-*or*-*ompon*nts ***or* *.**.*; v*rsions o* t** p**k*** **s*-*or*-*ompon*nts ***or* *.*.*; v*rsions o* t** p**k*** **s* ***or* *.**.*; v*rsions o* t** p**k*** **s*-*tml-*ompon*nts ***or* *.*.*; v*rsions o* t** p**k*** **s*

Reasoning

T** vuln*r**ility st*mm** *rom uns*nitiz** *r**/**tion/sr* *ttri*ut*s in multipl* *ompon*nts. T** *ommit *i** s*ows: *) In Link.r***t.js, *r** w*s *ir**tly us** wit*out v*li**tion ***or* ***in* @*r*intr**/s*nitiz*-url. *) **n*r*t*-*ompon*nts.js w*s m