Ember.js Potential XSS Exploit When Binding `tagName` to User-Supplied Data
Moderate severity
GitHub Reviewed
Published
Jul 1, 2022
to the GitHub Advisory Database
•
Updated Aug 29, 2023
Package
Affected versions
<= 1.0.0.rc1.0
= 1.0.0.rc2.0
= 1.0.0.rc3.0
= 1.0.0.rc4.0
= 1.0.0.rc5.0
= 1.0.0.rc6.0
Patched versions
1.0.0.rc1.1
1.0.0.rc2.1
1.0.0.rc3.1
1.0.0.rc4.1
1.0.0.rc5.1
1.0.0.rc6.1
Description
Published by the National Vulnerability Database
Jun 30, 2022
Published to the GitHub Advisory Database
Jul 1, 2022
Reviewed
Jul 12, 2022
Last updated
Aug 29, 2023
In general, Ember.js escapes or strips any user-supplied content before inserting it in strings that will be sent to innerHTML. However, the
tagName
property of anEmber.View
was inserted into such a string without being sanitized. This means that if an application assigns a view'stagName
to user-supplied data, a specially-crafted payload could execute arbitrary JavaScript in the context of the current domain ("XSS"). This vulnerability only affects applications that assign or bind user-provided content totagName
.References