CRITICAL · 9.9

CVE-2020-7741

This affects the package hellojs before 1.18.6. The code get the param oauth_redirect from url and pass it to location.assign without any check and sanitisation. So we can simply pass some XSS payload...

Vulnerability Description

This affects the package hellojs before 1.18.6. The code get the param oauth_redirect from url and pass it to location.assign without any check and sanitisation. So we can simply pass some XSS payloads into the url param oauth_redirect, such as javascript:alert(1).

CVSS Score

9.9

CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality
LOW
Integrity
LOW
Availability
HIGH

Affected Products

VendorProductVersions
Hello.Js ProjectHello.Js< 1.18.6

Related Weaknesses (CWE)

References

FAQ

What is CVE-2020-7741?

CVE-2020-7741 is a vulnerability with a CVSS score of 9.9 (CRITICAL). This affects the package hellojs before 1.18.6. The code get the param oauth_redirect from url and pass it to location.assign without any check and sanitisation. So we can simply pass some XSS payload...

How severe is CVE-2020-7741?

CVE-2020-7741 has been rated CRITICAL with a CVSS base score of 9.9/10. This is considered a critical vulnerability requiring immediate attention.

Is there a patch for CVE-2020-7741?

Check the references section above for vendor advisories and patch information. Affected products include: Hello.Js Project Hello.Js.