CVE-2024-27103

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-27103
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-27103.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-27103
Aliases
  • GHSA-3hjm-9277-5c88
Published
2024-02-28T17:41:36.012Z
Modified
2025-11-30T17:51:58.705144Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
Querybook Stored Cross-Site Scripting allows Privilege Elevation
Details

Querybook is a Big Data Querying UI. When a user searches for their queries, datadocs, tables and lists, the search result is marked and highlighted, and this feature uses dangerouslySetInnerHTML which means that if the highlighted result has an XSS payload it will trigger. While the input to dangerouslySetInnerHTML is not sanitized for the data inside of queries which leads to an XSS vulnerability. During the "query auto-suggestion" the name of the suggested tables are set with innerHTML which leads to the XSS vulnerability. A patch to rectify this issue has been introduced in Querybook version 3.31.2.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/27xxx/CVE-2024-27103.json",
    "cwe_ids": [
        "CWE-79"
    ]
}
References

Affected packages

Git / github.com/pinterest/querybook

Affected ranges

Type
GIT
Repo
https://github.com/pinterest/querybook
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v2.*

v2.3.0
v2.4.0

v3.*

v3.14.2
v3.28.0