← Back to CVEs
CVE-2019-16772
LOW3.1
Description
The serialize-to-js NPM package before version 3.0.1 is vulnerable to Cross-site Scripting (XSS). It does not properly mitigate against unsafe characters in serialized regular expressions. This vulnerability is not affected on Node.js environment since Node.js's implementation of RegExp.prototype.toString() backslash-escapes all forward slashes in regular expressions. If serialized data of regular expression objects are used in an environment other than Node.js, it is affected by this vulnerability.
CVE Details
CVSS v3.1 Score3.1
SeverityLOW
CVSS VectorCVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
Attack VectorNETWORK
ComplexityHIGH
Privileges RequiredLOW
User InteractionNONE
Published12/7/2019
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
serialize-to-js_project:serialize-to-js
Weaknesses (CWE)
CWE-79CWE-79
References
https://github.com/commenthol/serialize-to-js/commit/181d7d583ae5293cd47cc99b14ad13352875f3e3(security-advisories@github.com)
https://github.com/commenthol/serialize-to-js/security/advisories/GHSA-3fjq-93xj-3f3f(security-advisories@github.com)
https://github.com/commenthol/serialize-to-js/commit/181d7d583ae5293cd47cc99b14ad13352875f3e3(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/commenthol/serialize-to-js/security/advisories/GHSA-3fjq-93xj-3f3f(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.