{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-29896","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2024-03-21T15:12:08.998Z","datePublished":"2024-03-28T12:48:53.104Z","dateUpdated":"2024-08-02T01:17:58.611Z"},"containers":{"cna":{"title":"Astro-Shield's Content-Security-Policy header generation in middleware could be compromised by malicious injections","problemTypes":[{"descriptions":[{"cweId":"CWE-74","lang":"en","description":"CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/KindSpells/astro-shield/security/advisories/GHSA-w387-5qqw-7g8m","tags":["x_refsource_CONFIRM"],"url":"https://github.com/KindSpells/astro-shield/security/advisories/GHSA-w387-5qqw-7g8m"},{"name":"https://github.com/KindSpells/astro-shield/commit/41b84576d37fa486a57005ea297658d0bc38566d","tags":["x_refsource_MISC"],"url":"https://github.com/KindSpells/astro-shield/commit/41b84576d37fa486a57005ea297658d0bc38566d"}],"affected":[{"vendor":"KindSpells","product":"astro-shield","versions":[{"version":"= 1.2.0","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2024-03-28T12:48:53.104Z"},"descriptions":[{"lang":"en","value":"Astro-Shield is a library to compute the subresource integrity hashes for your JS scripts and CSS stylesheets. When automated CSP headers generation for SSR content is enabled and the web application serves content that can be partially controlled by external users, then it is possible that the CSP headers generation feature might be \"allow-listing\" malicious injected resources like inlined JS, or references to external malicious scripts. The fix is available in version 1.3.0."}],"source":{"advisory":"GHSA-w387-5qqw-7g8m","discovery":"UNKNOWN"}},"adp":[{"affected":[{"vendor":"kindspells","product":"astro-shield","cpes":["cpe:2.3:a:kindspells:astro-shield:1.2.0:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"1.2.0","status":"affected","lessThan":"1.3.0","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-06-20T15:06:11.110604Z","id":"CVE-2024-29896","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-20T15:09:28.064Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T01:17:58.611Z"},"title":"CVE Program Container","references":[{"name":"https://github.com/KindSpells/astro-shield/security/advisories/GHSA-w387-5qqw-7g8m","tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/KindSpells/astro-shield/security/advisories/GHSA-w387-5qqw-7g8m"},{"name":"https://github.com/KindSpells/astro-shield/commit/41b84576d37fa486a57005ea297658d0bc38566d","tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/KindSpells/astro-shield/commit/41b84576d37fa486a57005ea297658d0bc38566d"}]}]}}