cve/2024/CVE-2024-41677.md
2024-08-09 18:54:21 +00:00

18 lines
1.3 KiB
Markdown

### [CVE-2024-41677](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41677)
![](https://img.shields.io/static/v1?label=Product&message=qwik&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%40builder.io%2Fqwik%3A%20%3C%201.7.3%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen)
### Description
Qwik is a performance focused javascript framework. A potential mutation XSS vulnerability exists in Qwik for versions up to but not including 1.6.0. Qwik improperly escapes HTML on server-side rendering. It converts strings according to the rules found in the `render-ssr.ts` file. It sometimes causes the situation that the final DOM tree rendered on browsers is different from what Qwik expects on server-side rendering. This may be leveraged to perform XSS attacks, and a type of the XSS is known as mXSS (mutation XSS). This has been resolved in qwik version 1.6.0 and @builder.io/qwik version 1.7.3. All users are advised to upgrade. There are no known workarounds for this vulnerability.
### POC
#### Reference
- https://github.com/QwikDev/qwik/security/advisories/GHSA-2rwj-7xq8-4gx4
#### Github
No PoCs found on GitHub currently.