Description
The npm package "striptags" is an implementation of PHP's strip_tags in Typescript. In striptags before version 3.2.0, a type-confusion vulnerability can cause `striptags` to concatenate unsanitized strings when an array-like object is passed in as the `html` parameter. This can be abused by an attacker who can control the shape of their input, e.g. if query parameters are passed directly into the function. This can lead to a XSS.
Remediation
References
https://github.com/ericnorris/striptags/commit/f252a6b0819499cd65403707ebaf5cc925f2faca
https://github.com/ericnorris/striptags/releases/tag/v3.2.0
https://github.com/ericnorris/striptags/security/advisories/GHSA-qxg5-2qff-p49r
https://www.npmjs.com/package/striptags
Related Vulnerabilities
CVE-2021-3632 Vulnerability in maven package org.keycloak:keycloak-core
CVE-2015-3253 Vulnerability in maven package org.codehaus.groovy:groovy
CVE-2023-24807 Vulnerability in maven package org.webjars.npm:undici
CVE-2019-12399 Vulnerability in maven package org.apache.kafka:kafka
CVE-2022-1233 Vulnerability in maven package org.webjars.npm:urijs