CVE-2023-23630
XSS attack vulnerability in eta (npm)

XSS attack No known exploit Fixable By Resolved Security

What is CVE-2023-23630 About?

This vulnerability is a Cross-Site Scripting (XSS) attack impacting users of the Express API via the eta-dev/eta template engine. Successful exploitation allows for arbitrary client-side code execution within the user's browser context, potentially leading to session hijacking or data theft. Exploitation is relatively easy if user-supplied data is not properly sanitized before being passed to 'res.renderFile'.

Affected Software

eta <2.0.0

Technical Details

The XSS vulnerability resides in the eta template engine, specifically when user-supplied data is directly passed to the res.renderFile method without proper sanitization. An attacker can inject malicious script tags or other executable HTML into input fields that are later rendered by the application. When a victim's browser processes this rendered template, the injected script executes within the victim's session, leading to arbitrary client-side code execution. The underlying mechanism is the lack of output encoding for untrusted input.

What is the Impact of CVE-2023-23630?

Successful exploitation may allow attackers to execute arbitrary client-side scripts, hijack user sessions, deface web content, or steal sensitive information from affected users.

What is the Exploitability of CVE-2023-23630?

Exploitation is of low to moderate complexity, primarily requiring an attacker to inject malicious script into input fields that are subsequently rendered by the vulnerable res.renderFile function. No specific authentication or elevated privileges are required; any user capable of submitting data processed by the vulnerable function can execute the attack. This is primarily a remote vulnerability. The likelihood of exploitation is increased when applications directly embed user-controlled input into rendered templates without proper sanitization or encoding, making it a common client-side attack vector.

What are the Known Public Exploits?

PoC Author Link Commentary
No known exploits

What are the Available Fixes for CVE-2023-23630?

A Fix by Resolved Security Exists!
Learn how our approach backports security patches directly to your dependencies.

About the Fix from Resolved Security

None

Available Upgrade Options

  • eta
    • <2.0.0 → Upgrade to 2.0.0

Struggling with dependency upgrades?

See how Resolved Security's drop-in replacements make it simple.

Book a demo

Additional Resources

What are Similar Vulnerabilities to CVE-2023-23630?

Similar Vulnerabilities: CVE-2023-24884 , CVE-2023-38038 , CVE-2023-37905 , CVE-2023-36868 , CVE-2023-29406