CVE-2024-29896: Content-Security-Policy header generation in middleware could be compromised by malicious injections
When the following conditions are met:
- Automated CSP headers generation for SSR content is enabled
- The web application serves content that can be partially controlled by external users
Then it is possible that the CSP headers generation feature might be “allow-listing” malicious injected resources like inlined JS, or references to external malicious scripts.
References
- github.com/KindSpells/astro-shield
- github.com/KindSpells/astro-shield/commit/41b84576d37fa486a57005ea297658d0bc38566d
- github.com/KindSpells/astro-shield/commit/ad3abf5577bae9be420b7ddf376337a5b8817869
- github.com/KindSpells/astro-shield/compare/1.2.0...1.3.0
- github.com/KindSpells/astro-shield/security/advisories/GHSA-w387-5qqw-7g8m
- github.com/advisories/GHSA-w387-5qqw-7g8m
- nvd.nist.gov/vuln/detail/CVE-2024-29896
Detect and mitigate CVE-2024-29896 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →