GHSA-wjmj-h3xc-hxp8

Suggest an improvement
Source
https://github.com/advisories/GHSA-wjmj-h3xc-hxp8
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/06/GHSA-wjmj-h3xc-hxp8/GHSA-wjmj-h3xc-hxp8.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-wjmj-h3xc-hxp8
Aliases
Related
Published
2024-06-06T22:58:46Z
Modified
2024-10-31T22:24:07Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
  • 6.9 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
Generation of Error Message Containing Sensitive Information in zsa
Details

Impact

All users are impacted. The zsa application transfers the parse error stack from the server to the client in production build mode. This can potentially reveal sensitive information about the server environment, such as the machine username and directory paths. An attacker could exploit this vulnerability to gain unauthorized access to sensitive server information. This information could be used to plan further attacks or gain a deeper understanding of the server infrastructure.

Patches

Yes, this has been pathed on 0.3.3

Workarounds

No way to fix other than the patch.

Database specific
{
    "nvd_published_at": "2024-06-07T15:15:50Z",
    "cwe_ids": [
        "CWE-209"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2024-06-06T22:58:46Z"
}
References

Affected packages

npm / zsa

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.3.3