Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. express
  4. ›
  5. CVE-2024-10491

CVE-2024-10491: Express ressource injection

October 29, 2024 (updated December 19, 2024)

A vulnerability has been identified in the Express response.links function, allowing for arbitrary resource injection in the Link header when unsanitized data is used.

The issue arises from improper sanitization in Link header values, which can allow a combination of characters like ,, ;, and <> to preload malicious resources.

This vulnerability is especially relevant for dynamic parameters.

References

  • github.com/advisories/GHSA-cm5g-3pgc-8rg4
  • github.com/expressjs/express
  • github.com/expressjs/express/issues/6222
  • nvd.nist.gov/vuln/detail/CVE-2024-10491
  • www.herodevs.com/vulnerability-directory/cve-2024-10491

Code Behaviors & Features

Detect and mitigate CVE-2024-10491 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 4.0.0-rc1

Fixed versions

  • 4.0.0-rc1

Solution

Upgrade to version 4.0.0-rc1 or above.

Impact 5.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Source file

npm/express/CVE-2024-10491.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:03 +0000.