DEBIAN-CVE-2024-21501

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2024-21501
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-21501.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2024-21501
Upstream
Published
2024-02-24T05:15:44Z
Modified
2025-09-19T06:02:53Z
Summary
[none]
Details

Versions of the package sanitize-html before 2.12.1 are vulnerable to Information Exposure when used on the backend and with the style attribute allowed, allowing enumeration of files in the system (including project dependencies). An attacker could exploit this vulnerability to gather details about the file system structure and dependencies of the targeted server.

References

Affected packages

Debian:13 / node-sanitize-html

Package

Name
node-sanitize-html
Purl
pkg:deb/debian/node-sanitize-html?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.13.0+~2.11.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / node-sanitize-html

Package

Name
node-sanitize-html
Purl
pkg:deb/debian/node-sanitize-html?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.13.0+~2.11.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}