In Nunjucks versions prior to version 3.2.4, it was
possible to bypass the restrictions which are provided by the autoescape
functionality. If there are two user-controlled parameters on the same
line used in the views, it was possible to inject cross site scripting
payloads using the backslash \ character.
References
| Link | Resource |
|---|---|
| https://bugzilla.mozilla.org/show_bug.cgi?id=1825980 | Issue Tracking Permissions Required |
| https://github.com/mozilla/nunjucks/security/advisories/GHSA-x77j-w7wf-fjmw | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2024-11-26 12:15
Updated : 2025-06-24 16:42
NVD link : CVE-2023-2142
Mitre link : CVE-2023-2142
CVE.ORG link : CVE-2023-2142
JSON object : View
Products Affected
mozilla
- nunjucks
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
