apostrophecms / sanitize-html

Clean up user-submitted HTML, preserving whitelisted elements and whitelisted attributes on a per-element basis. Built on htmlparser2 for speed and tolerance

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Fix checkmarx vulnerability

finbargp opened this issue · comments

Apologies if this has been reported before, but I couldn't find it. I'm using v2.11 of sanitize-html

To Reproduce

When I attempt to commit any change to my package.json in IntelliJ I get the following warning, which I have to override each time:

Dependency npm:sanitize-html:2.11.0 is vulnerable Cx24228ad1-81fd 6.1 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability Results powered by Checkmarx(c)

Link to issue: https://devhub.checkmarx.com/cve-details/Cx24228ad1-81fd/

Expected behavior

There should not be a checkmarx vulnerability like this in sanitize-html.

Describe the bug

Checkmarx vulnerability.

Details

Version of Node.js:
v18.17.1

Server Operating System:
MacOS X

Thanks for reporting this, but the vulnerability page in question is very much not accurate.

Only a developer can pass allowedTags, therefore it is not a "network" vulnerability and it certainly is not "privileges required: none."

A person who can change the non-user-input parameters to sanitize-html is a developer, i.e. they can just bypass it completely, not invoke sanitize-html at all, etc. This is not a real vulnerability. If you look at the original issue linked on that page, it's a developer suggesting that the option could be checked for its type, which was actually added for those using typescript. It has nothing to do with any actual security vulnerability.

It's unfortunate that checkmarx seems to provide no way to get in contact regarding these pages, however I have filled out their sales contact form and will try to reach a human to get this removed.

All that said, I do appreciate your concern and your report. I just can't fix a vulnerability that does not exist. I'll do my best to get checkmarx to remove this inaccurate report.

(If you have a means of getting checkmarx' attention, I would appreciate being put in contact - happy to help get this off your plate by getting the inaccurate report corrected.)

OK thanks for your response and confirming this isn't a real vulnerability. I don't have any means of getting checkmarx' attention. I appreciate it if you're able to get checkmarx to close this so sanitize-html doesn't show up as vulnerable in our IDEs etc.

Good news: today they followed up and removed the vulnerability.

That's great news @boutell - thanks for following up on this!