cve/2024/CVE-2024-10491.md
2025-09-29 16:08:36 +00:00

18 lines
1.0 KiB
Markdown
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2024-10491](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10491)
![](https://img.shields.io/static/v1?label=Product&message=express&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=3.0.0-alpha1%3C%3D%203.21.2%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20('Injection')&color=brighgreen)
### Description
A vulnerability has been identified in the Express response.links function, allowing for arbitrary resource injection in the Link header when unsanitized data is used.The issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `<>` to preload malicious resources.This vulnerability is especially relevant for dynamic parameters.
### POC
#### Reference
- https://www.herodevs.com/vulnerability-directory/cve-2024-10491
#### Github
- https://github.com/yokozuna47/backend-diary