CVE-2024-43799

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-43799
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-43799.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-43799
Aliases
Downstream
Related
Published
2024-09-10T14:45:06Z
Modified
2025-10-15T13:09:51.469042Z
Severity
  • 5.0 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L CVSS Calculator
Summary
send vulnerable to template injection that can lead to XSS
Details

Send is a library for streaming files from the file system as a http response. Send passes untrusted user input to SendStream.redirect() which executes untrusted code. This issue is patched in send 0.19.0.

References

Affected packages

Git / github.com/pillarjs/send

Affected ranges

Type
GIT
Repo
https://github.com/pillarjs/send
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.0.2
0.0.3
0.0.4
0.1.0
0.1.1
0.1.2
0.1.3
0.1.4
0.10.0
0.10.1
0.11.0
0.11.1
0.12.0
0.12.1
0.12.2
0.12.3
0.13.0
0.13.1
0.13.2
0.14.0
0.14.1
0.14.2
0.15.0
0.15.1
0.15.2
0.15.3
0.15.4
0.15.5
0.15.6
0.16.0
0.16.1
0.16.2
0.17.0
0.17.1
0.17.2
0.18.0
0.2.0
0.3.0
0.4.0
0.4.1
0.4.2
0.4.3
0.5.0
0.6.0
0.7.0
0.7.1
0.7.2
0.7.3
0.7.4
0.8.0
0.8.1
0.8.2
0.8.3
0.8.4
0.8.5
0.9.0
0.9.1
0.9.2
0.9.3