Description
@dcl/single-sign-on-client is an open source npm library which deals with single sign on authentication flows. Improper input validation in the `init` function allows arbitrary javascript to be executed using the `javascript:` prefix. This vulnerability has been patched on version `0.1.0`. Users are advised to upgrade. Users unable to upgrade should limit untrusted user input to the `init` function.
Remediation
References
https://github.com/decentraland/single-sign-on-client/security/advisories/GHSA-vp4f-wxgw-7x8x
https://github.com/decentraland/single-sign-on-client/commit/bd20ea9533d0cda30809d929db85b1b76cef855a
Related Vulnerabilities
CVE-2020-11971 Vulnerability in maven package org.apache.camel:camel-api
CVE-2022-34815 Vulnerability in maven package org.jenkins-ci.plugins:rrod
CVE-2017-8028 Vulnerability in maven package org.springframework.ldap:spring-ldap-core
CVE-2017-15703 Vulnerability in maven package org.apache.nifi:nifi-authorizer
CVE-2014-7810 Vulnerability in maven package org.apache.tomcat:tomcat-jasper