Description
Apostrophe Technologies sanitize-html before 2.3.2 does not properly validate the hostnames set by the "allowedIframeHostnames" option when the "allowIframeRelativeUrls" is set to true, which allows attackers to bypass hostname whitelist for iframe element, related using an src value that starts with "/\\example.com".
Remediation
References
https://advisory.checkmarx.net/advisory/CX-2021-4309
https://github.com/apostrophecms/sanitize-html/blob/main/CHANGELOG.md#232-2021-01-26
https://github.com/apostrophecms/sanitize-html/pull/460
Related Vulnerabilities
CVE-2022-23618 Vulnerability in maven package org.xwiki.platform:xwiki-platform-oldcore
CVE-2023-41578 Vulnerability in maven package org.jeecgframework.boot:jeecg-boot-parent
CVE-2019-25102 Vulnerability in npm package simple-markdown
CVE-2022-24279 Vulnerability in npm package madlib-object-utils
CVE-2022-22984 Vulnerability in npm package snyk-docker-plugin