Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
esm.sh CDN service has JS Template Literal Injection in CSS-to-JavaScript
Vulnerability Description
esm.sh is a nobuild content delivery network(CDN) for modern web development. Prior to version 136, The esm.sh CDN service contains a Template Literal Injection vulnerability (CWE-94) in its CSS-to-JavaScript module conversion feature. When a CSS file is requested with the ?module query parameter, esm.sh converts it to a JavaScript module by embedding the CSS content directly into a template literal without proper sanitization. An attacker can inject malicious JavaScript code using ${...} expressions within CSS files, which will execute when the module is imported by victim applications. This enables Cross-Site Scripting (XSS) in browsers and Remote Code Execution (RCE) in Electron applications. This issue has been patched in version 136.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Vulnerability Type
对生成代码的控制不恰当(代码注入)
Vulnerability Title
esm.sh 代码注入漏洞
Vulnerability Description
esm.sh是esm.sh开源的一个内容分发网络。 esm.sh 136之前版本存在代码注入漏洞,该漏洞源于CSS转JavaScript模块功能存在模板字面量注入漏洞,可能导致跨站脚本攻击或远程代码执行。
CVSS Information
N/A
Vulnerability Type
N/A