Description
@dcl/single-sign-on-client is an open source npm library which deals with single sign on authentication flows. Improper input validation in the `init` function allows arbitrary javascript to be executed using the `javascript:` prefix. This vulnerability has been patched on version `0.1.0`. Users are advised to upgrade. Users unable to upgrade should limit untrusted user input to the `init` function.
Remediation
References
https://github.com/decentraland/single-sign-on-client/security/advisories/GHSA-vp4f-wxgw-7x8x
https://github.com/decentraland/single-sign-on-client/commit/bd20ea9533d0cda30809d929db85b1b76cef855a
Related Vulnerabilities
CVE-2023-30547 Vulnerability in npm package vm2
CVE-2019-10247 Vulnerability in maven package org.eclipse.jetty:jetty-server
CVE-2018-11765 Vulnerability in maven package org.apache.hadoop:hadoop-common
CVE-2023-32695 Vulnerability in maven package org.webjars.npm:socket.io-parser
CVE-2021-42340 Vulnerability in maven package org.apache.tomcat:tomcat-websocket