Name | CVE-2019-14862 |
Description | There is a vulnerability in knockout before version 3.5.0-beta, where after escaping the context of the web application, the web application delivers data to its users along with other trusted dynamic content, without validating it. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 943560 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
node-knockout (PTS) | buster | 3.4.2-2+deb10u1 | fixed |
bullseye | 3.5.1-1 | fixed | |
sid, trixie, bookworm | 3.5.1+ds-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
node-knockout | source | buster | 3.4.2-2+deb10u1 | |||
node-knockout | source | (unstable) | 3.4.2-3 | unimportant | 943560 |
https://github.com/knockout/knockout/issues/1244
https://github.com/knockout/knockout/pull/2345
https://github.com/knockout/knockout/commit/7e280b2b8a04cc19176b5171263a5c68bda98efb
Only impacts browsers which are totally insecure and EOLed anyway