Vulnerabilities/

XSS in hello.js

Severity:
High

Description

This affects the package hello.js before 1.18.6. The code get the param oauth_redirect from url and pass it to location.assign without any check and sanitisation. So we can simply pass some XSS payloads into the url param oauth_redirect, such as javascript:alert(1).

Recommendation

Update the hellojs package to the latest compatible version. Followings are version details:

References

Related Issues

Tags:
npm
hellojs
Anything's wrong? Let us know Last updated on September 12, 2023

This issue is available in SmartScanner Professional

See Pricing