A vulnerability has been identified in the Express response.links function, allowing for arbitrary resource injection in the Link header when unsanitized data is used. The issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `<>` to preload malicious resources. This vulnerability is especially relevant for dynamic parameters.
2024-10-29T17:15:03.853
2024-11-06T23:08:49.780
Analyzed
36c7be3b-2937-45df-85ea-ca7133ea542c
CVSSv3.1: 4.0 (MEDIUM)