CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
AI Score
Confidence
High
EPSS
Percentile
17.7%
Express.js minimalist web framework for node. In express < 4.20.0, passing untrusted user input - even after sanitizing it - to response.redirect() may execute untrusted code. This issue is patched in express 4.20.0.
Vendor | Product | Version | CPE |
---|---|---|---|
openjsf | express | * | cpe:2.3:a:openjsf:express:*:*:*:*:*:node.js:*:* |
openjsf | express | 5.0.0 | cpe:2.3:a:openjsf:express:5.0.0:alpha1:*:*:*:node.js:*:* |
openjsf | express | 5.0.0 | cpe:2.3:a:openjsf:express:5.0.0:alpha2:*:*:*:node.js:*:* |
openjsf | express | 5.0.0 | cpe:2.3:a:openjsf:express:5.0.0:alpha3:*:*:*:node.js:*:* |
openjsf | express | 5.0.0 | cpe:2.3:a:openjsf:express:5.0.0:alpha4:*:*:*:node.js:*:* |
openjsf | express | 5.0.0 | cpe:2.3:a:openjsf:express:5.0.0:alpha5:*:*:*:node.js:*:* |
openjsf | express | 5.0.0 | cpe:2.3:a:openjsf:express:5.0.0:alpha6:*:*:*:node.js:*:* |
openjsf | express | 5.0.0 | cpe:2.3:a:openjsf:express:5.0.0:alpha7:*:*:*:node.js:*:* |
openjsf | express | 5.0.0 | cpe:2.3:a:openjsf:express:5.0.0:alpha8:*:*:*:node.js:*:* |
openjsf | express | 5.0.0 | cpe:2.3:a:openjsf:express:5.0.0:beta1:*:*:*:node.js:*:* |
[
{
"vendor": "expressjs",
"product": "express",
"versions": [
{
"version": "< 4.20.0",
"status": "affected"
},
{
"version": ">= 5.0.0-alpha.1, < 5.0.0",
"status": "affected"
}
]
}
]