Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. zsa
  4. ›
  5. CVE-2024-37162

CVE-2024-37162: Generation of Error Message Containing Sensitive Information in zsa

June 6, 2024 (updated October 31, 2024)

All users are impacted. The zsa application transfers the parse error stack from the server to the client in production build mode. This can potentially reveal sensitive information about the server environment, such as the machine username and directory paths. An attacker could exploit this vulnerability to gain unauthorized access to sensitive server information. This information could be used to plan further attacks or gain a deeper understanding of the server infrastructure.

References

  • github.com/IdoPesok/zsa
  • github.com/IdoPesok/zsa/commit/86b86b282bde6780963f62406cc8bc65f2c86f3a
  • github.com/IdoPesok/zsa/security/advisories/GHSA-wjmj-h3xc-hxp8
  • github.com/advisories/GHSA-wjmj-h3xc-hxp8
  • nvd.nist.gov/vuln/detail/CVE-2024-37162

Code Behaviors & Features

Detect and mitigate CVE-2024-37162 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.3.3

Fixed versions

  • 0.3.3

Solution

Upgrade to version 0.3.3 or above.

Impact 5.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-209: Generation of Error Message Containing Sensitive Information

Source file

npm/zsa/CVE-2024-37162.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:40 +0000.