Bug 2312631 (CVE-2024-45801)

Summary: CVE-2024-45801 dompurify: XSS vulnerability via prototype pollution
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: aazores, akostadi, amasferr, amctagga, anjoseph, brking, cbartlet, cdaley, chazlett, cmiranda, danken, dhanak, dholler, dmayorov, eaguilar, ebaron, ecerquei, eric.wittmann, fdeutsch, gkamathe, gparvin, haoli, hkataria, ibek, janstey, jcammara, jcantril, jchui, jkang, jkoehler, jlledo, jmitchel, jneedle, jpallich, jprabhak, jrokos, jwendell, kshier, ktsao, kverlaen, lbainbri, lchilton, mabashia, mjaros, mkudlej, mmakovy, mnovotny, nboldt, nipatil, njean, oramraz, owatkins, pahickey, pantinor, pbraun, pcongius, phoracek, pjindal, rcernich, rguimara, rhaigner, rkubis, rtaniwa, sdawley, sfeifer, sfroberg, simaishi, smcdonal, smullick, stcannon, stirabos, teagle, tfister, thavo, tjochec, tkral, twalsh, wtam, yguenane
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in DOMPurify. This issue may allow an attacker to use specially-crafted HTML to bypass the depth checking or use Prototype Pollution to weaken the depth check, which can lead to cross site scripting (XSS) attacks.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description OSIDB Bzimport 2024-09-16 19:20:33 UTC
DOMPurify is a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. It has been discovered that malicious HTML using special nesting techniques can bypass the depth checking added to DOMPurify in recent releases. It was also possible to use Prototype Pollution to weaken the depth check. This renders dompurify unable to avoid cross site scripting (XSS) attacks. This issue has been addressed in versions 2.5.4 and 3.1.3 of DOMPurify. All users are advised to upgrade. There are no known workarounds for this vulnerability.

Comment 1 errata-xmlrpc 2024-10-07 01:12:48 UTC
This issue has been addressed in the following products:

  Cryostat 3 on RHEL 8

Via RHSA-2024:7706 https://access.redhat.com/errata/RHSA-2024:7706

Comment 2 errata-xmlrpc 2024-10-22 01:07:08 UTC
This issue has been addressed in the following products:

  NETWORK-OBSERVABILITY-1.7.0-RHEL-9

Via RHSA-2024:8014 https://access.redhat.com/errata/RHSA-2024:8014

Comment 3 errata-xmlrpc 2024-12-03 16:17:16 UTC
This issue has been addressed in the following products:

  Red Hat Ansible Automation Platform 2.4 for RHEL 8
  Red Hat Ansible Automation Platform 2.4 for RHEL 9

Via RHSA-2024:10762 https://access.redhat.com/errata/RHSA-2024:10762

Comment 4 errata-xmlrpc 2025-02-03 13:09:34 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Dev Spaces 3 Containers

Via RHSA-2025:0892 https://access.redhat.com/errata/RHSA-2025:0892

Comment 9 errata-xmlrpc 2025-04-22 23:52:08 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.18

Via RHSA-2025:4019 https://access.redhat.com/errata/RHSA-2025:4019