gettext.js is a GNU gettext port for node and the browser. There is a cross-site scripting (XSS) injection if `.po` dictionary definition files are corrupted. This vulnerability has been patched in version 2.0.3. As a workaround, control the origin of the definition catalog to prevent the use of this flaw in the definition of plural forms.
Metrics
Affected Vendors & Products
References
History
Fri, 16 Aug 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 16 Aug 2024 00:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | gettext.js is a GNU gettext port for node and the browser. There is a cross-site scripting (XSS) injection if `.po` dictionary definition files are corrupted. This vulnerability has been patched in version 2.0.3. As a workaround, control the origin of the definition catalog to prevent the use of this flaw in the definition of plural forms. | |
Title | gettext.js vulnerable to cross-site scripting (XSS) | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-08-15T23:44:47.808Z
Updated: 2024-08-16T15:10:20.251Z
Reserved: 2024-08-09T14:23:55.513Z
Link: CVE-2024-43370
Vulnrichment
Updated: 2024-08-16T15:10:10.336Z
NVD
Status : Awaiting Analysis
Published: 2024-08-16T02:15:17.487
Modified: 2024-08-19T13:00:23.117
Link: CVE-2024-43370
Redhat
No data.