CVE-2024-45801
CVE-2024-45801 affects DOMPurify, a widely used XSS sanitizer, allowing attackers to bypass its defenses using specially crafted HTML. This vulnerability permits cross-site scripting (XSS) attacks due to flaws in depth checking and potential Prototype Pollution, rendering DOMPurify ineffective against malicious code injection. Despite a CVSS score of 0, indicating a low immediate impact based solely on the vulnerability's characteristics, the SVRS of 30 suggests a moderate level of concern, based on the risk visibility. While not critical, the potential for exploitation exists, and the 'In The Wild' tag suggests observed malicious activity. Upgrading to DOMPurify versions 2.5.4 or 3.1.3 is strongly advised to mitigate the risk of exploitation, as no workarounds exist. The significance of this vulnerability lies in its ability to compromise web applications relying on DOMPurify for sanitizing user-supplied HTML, potentially leading to data theft or unauthorized actions.
Description
CVE-2024-45801 is a critical vulnerability in DOMPurify, a popular HTML sanitizer used to prevent cross-site scripting (XSS) attacks. This vulnerability allows malicious HTML to bypass DOMPurify's depth checking and prototype pollution, rendering it ineffective in preventing XSS attacks.
Key Insights
- High Severity: The SVRS of 30 indicates a moderate severity, highlighting the urgency of addressing this vulnerability.
- Active Exploitation: This vulnerability is actively exploited in the wild, posing an immediate threat to organizations using DOMPurify.
- CISA Warning: The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about this vulnerability, urging organizations to take immediate action.
- No Workarounds: There are no known workarounds for this vulnerability, making it essential to upgrade to the latest version of DOMPurify.
Mitigation Strategies
- Upgrade DOMPurify: Update to DOMPurify version 2.5.4 or 3.1.3 to address this vulnerability.
- Implement Input Validation: Implement robust input validation mechanisms to prevent malicious HTML from reaching DOMPurify.
- Use a Web Application Firewall (WAF): Deploy a WAF to block malicious requests that attempt to exploit this vulnerability.
- Monitor for Suspicious Activity: Monitor logs and security alerts for any suspicious activity that may indicate an exploitation attempt.
Additional Information
If you have any further questions regarding this incident, you can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.