Improper input validation in the init
function allows arbitrary javascript to be executed using the javascript:
prefix
SSO.init('javascript:alert("javascript successfully injected")')
This vulnerability was patched on version 0.1.0
This vulnerability can be prevented if user input correctly sanitized or there is no user input pass to the init
function
{ "nvd_published_at": "2023-09-01T20:15:07Z", "cwe_ids": [ "CWE-79" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2023-09-04T16:36:27Z" }