Vulnerability Description
Express.js minimalist web framework for node. In express < 4.20.0, passing untrusted user input - even after sanitizing it - to response.redirect() may execute untrusted code. This issue is patched in express 4.20.0.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openjsf | Express | < 4.20.0 |
Related Weaknesses (CWE)
References
- https://github.com/expressjs/express/commit/54271f69b511fea198471e6ff3400ab805d6Patch
- https://github.com/expressjs/express/security/advisories/GHSA-qw6h-vgh9-j6wxVendor Advisory
FAQ
What is CVE-2024-43796?
CVE-2024-43796 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Express.js minimalist web framework for node. In express < 4.20.0, passing untrusted user input - even after sanitizing it - to response.redirect() may execute untrusted code. This issue is patched in...
How severe is CVE-2024-43796?
CVE-2024-43796 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-43796?
Check the references section above for vendor advisories and patch information. Affected products include: Openjsf Express.