This affects the package tempura before 0.4.0. If the input to the esc function is of type object (i.e an array) it is returned without being escaped/sanitized, leading to a potential Cross-Site Scripting vulnerability.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://snyk.io/vuln/SNYK-JS-TEMPURA-1569633 | patch mitigation exploit vdb entry third party advisory |
https://github.com/lukeed/tempura/commit/58a5c3671e2f36b26810e77ead9e0dd471902f9b | third party advisory patch |
https://github.com/lukeed/tempura/releases/tag/v0.4.0 | third party advisory release notes |