Description
The npm package "striptags" is an implementation of PHP's strip_tags in Typescript. In striptags before version 3.2.0, a type-confusion vulnerability can cause `striptags` to concatenate unsanitized strings when an array-like object is passed in as the `html` parameter. This can be abused by an attacker who can control the shape of their input, e.g. if query parameters are passed directly into the function. This can lead to a XSS.
Remediation
References
https://github.com/ericnorris/striptags/commit/f252a6b0819499cd65403707ebaf5cc925f2faca
https://github.com/ericnorris/striptags/releases/tag/v3.2.0
https://github.com/ericnorris/striptags/security/advisories/GHSA-qxg5-2qff-p49r
https://www.npmjs.com/package/striptags
Related Vulnerabilities
CVE-2020-7743 Vulnerability in maven package org.webjars.npm:mathjs
CVE-2023-34434 Vulnerability in maven package org.apache.inlong:manager-pojo
CVE-2022-45390 Vulnerability in maven package io.loader:loaderio-jenkins-plugin
CVE-2021-3647 Vulnerability in npm package urijs
CVE-2023-45134 Vulnerability in maven package org.xwiki.platform:xwiki-platform-web-templates