漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
@nestjs/core Improperly Neutralizes Special Elements in Output Used by a Downstream Component ('Injection')
Vulnerability Description
Nest is a framework for building scalable Node.js server-side applications. Prior to 11.1.18, SseStream._transform() interpolates message.type and message.id directly into Server-Sent Events text protocol output without sanitizing newline characters (\r, \n). Since the SSE protocol treats both \r and \n as field delimiters and \n\n as event boundaries, an attacker who can influence these fields through upstream data sources can inject arbitrary SSE events, spoof event types, and corrupt reconnection state. This vulnerability is fixed in 11.1.18.
CVSS Information
N/A
Vulnerability Type
输出中的特殊元素转义处理不恰当(注入)
Vulnerability Title
nest 注入漏洞
Vulnerability Description
nest是nestjs开源的一个 Node.js 框架,用于使用 TypeScript/JavaScript 构建高效、可扩展和企业级的服务器端应用程序。 Nest 11.1.18之前版本存在注入漏洞,该漏洞源于SseStream._transform函数将message.type和message.id直接插入服务器发送事件文本协议输出中,而未对换行符进行清理,可能导致能够通过上游数据源影响这些字段的攻击者注入任意SSE事件、伪造事件类型并破坏重连状态。
CVSS Information
N/A
Vulnerability Type
N/A