Description
@dcl/single-sign-on-client is an open source npm library which deals with single sign on authentication flows. Improper input validation in the `init` function allows arbitrary javascript to be executed using the `javascript:` prefix. This vulnerability has been patched on version `0.1.0`. Users are advised to upgrade. Users unable to upgrade should limit untrusted user input to the `init` function.
Remediation
References
https://github.com/decentraland/single-sign-on-client/commit/bd20ea9533d0cda30809d929db85b1b76cef855a
https://github.com/decentraland/single-sign-on-client/security/advisories/GHSA-vp4f-wxgw-7x8x
Related Vulnerabilities
CVE-2017-1000188 Vulnerability in npm package ejs
CVE-2022-44621 Vulnerability in maven package org.apache.kylin:kylin-server-base
CVE-2018-1999002 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2023-26149 Vulnerability in npm package quill-mention
CVE-2023-40311 Vulnerability in maven package org.opennms:opennms-webapp