In Nunjucks versions prior to version 3.2.4, it was possible to bypass the restrictions which are provided by the autoescape functionality. If there are two user-controlled parameters on the same line used in the views, it was possible to inject cross site scripting payloads using the backslash \ character.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1825980 | issue tracking |
https://github.com/mozilla/nunjucks/security/advisories/GHSA-x77j-w7wf-fjmw | vendor advisory |