Skip to content
This repository was archived by the owner on Feb 5, 2025. It is now read-only.

fix: Update AutoPublicPathRuntimeModule Webpack's #535

Closed
wants to merge 1 commit into from

Conversation

cur1pro
Copy link

@cur1pro cur1pro commented Dec 1, 2024

What changed? Why?
We discovered a DOM Clobbering vulnerability in Webpack’s AutoPublicPathRuntimeModule. The DOM Clobbering gadget in the module can lead to cross-site scripting (XSS) in web pages where scriptless attacker-controlled HTML elements (e.g., an img tag with an unsanitized name attribute) are present.

We found the real-world exploitation of this gadget in the Canvas LMS which allows XSS attack happens through an javascript code compiled by Webpack (the vulnerable part is from Webpack). We believe this is a severe issue. If Webpack’s code is not resilient to DOM Clobbering attacks, it could lead to significant security vulnerabilities in any web application using Webpack-compiled code.

Notes to reviewers
WeaknessCWE-79
CVE-2024-43788

How has it been tested?
We identified a DOM Clobbering vulnerability in Webpack’s AutoPublicPathRuntimeModule. When the output.publicPath field in the configuration is not set or is set to auto.

@cur1pro cur1pro closed this by deleting the head repository Jun 3, 2025
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Development

Successfully merging this pull request may close these issues.

1 participant