Vulnerability Description
serve-static serves static files. serve-static passes untrusted user input - even after sanitizing it - to redirect() may execute untrusted code. This issue is patched in serve-static 1.16.0.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openjsf | Serve-Static | < 1.16.0 |
Related Weaknesses (CWE)
References
- https://github.com/expressjs/serve-static/commit/0c11fad159898cdc69fd9ab63269b72Patch
- https://github.com/expressjs/serve-static/commit/ce730896fddce1588111d9ef6fdf208Patch
- https://github.com/expressjs/serve-static/security/advisories/GHSA-cm22-4g7w-348Vendor Advisory
FAQ
What is CVE-2024-43800?
CVE-2024-43800 is a vulnerability with a CVSS score of 5.0 (MEDIUM). serve-static serves static files. serve-static passes untrusted user input - even after sanitizing it - to redirect() may execute untrusted code. This issue is patched in serve-static 1.16.0.
How severe is CVE-2024-43800?
CVE-2024-43800 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-43800?
Check the references section above for vendor advisories and patch information. Affected products include: Openjsf Serve-Static.