CVE-2024-10491

Public on 2024-10-29
Modified on 2024-11-11
Description
A vulnerability has been identified in the Express response.links function, allowing for arbitrary resource injection in the Link header when unsanitized data is used.

The issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `<>` to preload malicious resources.

This vulnerability is especially relevant for dynamic parameters.
Severity
Medium severity
Medium
CVSS v3 Base Score
5.3
See breakdown

Affected Packages

Platform Package Release Date Advisory Status
HAQM Linux 2 - Core gjs Not Affected
HAQM Linux 2 - Mate-desktop1.x Extra mate-polkit Not Affected
HAQM Linux 2 - Core pcs Not Affected
HAQM Linux 2 - Core polkit Not Affected
HAQM Linux 2023 polkit Not Affected
HAQM Linux 2 - Core thunderbird Not Affected

CVSS Scores

Score Type Score Vector
HAQM Linux CVSSv3 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
NVD CVSSv3 4.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N