Description
backbone is a module that adds in structure to a JavaScript heavy application through key-value pairs and custom events connecting to your RESTful API through JSON There exists a potential Cross Site Scripting vulnerability in the `Model#Escape` function of backbone 0.3.3 and earlier, if a user is able to supply input. This is due to the regex that's replacing things to miss the conversion of things such as `<` to `<`.
Remediation
References
https://github.com/jashkenas/backbone/compare/0.3.3...0.5.0#diff-0d56d0d310de7ff18b3cef9c2f8f75dcL1008
https://nodesecurity.io/advisories/108
Related Vulnerabilities
CVE-2019-3875 Vulnerability in maven package org.keycloak:keycloak-server-spi-private
CVE-2021-27515 Vulnerability in maven package org.webjars.bowergithub.unshiftio:url-parse
CVE-2021-32731 Vulnerability in maven package org.xwiki.platform:xwiki-platform-web
CVE-2023-46122 Vulnerability in maven package org.scala-sbt:io_3
CVE-2019-3773 Vulnerability in maven package org.springframework.ws:spring-ws-core