mirror of
https://github.com/mountain-loop/yaak.git
synced 2026-01-11 14:30:24 +01:00
[PR #304] [CLOSED] [Security] Fix MEDIUM vulnerability: CVE-2024-53382 #226
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
📋 Pull Request Information
Original PR: https://github.com/mountain-loop/yaak/pull/304
Author: @orbisai0security
Created: 11/21/2025
Status: ❌ Closed
Base:
main← Head:fix-cve-2024-53382-package-lock.json📝 Commits (1)
6477dfcfix: resolve medium vulnerability CVE-2024-53382📊 Changes
2 files changed (+5 additions, -4 deletions)
View changed files
📝
package-lock.json(+3 -3)📝
package.json(+2 -1)📄 Description
Security Fix
This PR addresses a MEDIUM severity vulnerability detected by our security scanner.
Security Impact Assessment
Evidence: Proof-of-Concept Exploitation Demo
⚠️ For Educational/Security Awareness Only
This demonstration shows how the vulnerability could be exploited to help you understand its severity and prioritize remediation.
How This Vulnerability Can Be Exploited
The DOM Clobbering vulnerability in PrismJS's prism-autoloader plugin allows an attacker to overwrite the global
Prismobject with a DOM element by injecting HTML containing an element withid="Prism". In the context of Yaak, an API client that uses PrismJS for syntax highlighting in its web-based frontend (built with Tauri), an attacker could exploit this by tricking a user into making an API request to a malicious server that returns HTML content designed to clobber thePrismobject. If Yaak's response viewer has an HTML preview or rendering mode (common in API clients like Yaak for displaying response bodies), loading this HTML could interfere with PrismJS's autoloader functionality, potentially causing syntax highlighting failures or unexpected behavior in the app's UI.The DOM Clobbering vulnerability in PrismJS's prism-autoloader plugin allows an attacker to overwrite the global
Prismobject with a DOM element by injecting HTML containing an element withid="Prism". In the context of Yaak, an API client that uses PrismJS for syntax highlighting in its web-based frontend (built with Tauri), an attacker could exploit this by tricking a user into making an API request to a malicious server that returns HTML content designed to clobber thePrismobject. If Yaak's response viewer has an HTML preview or rendering mode (common in API clients like Yaak for displaying response bodies), loading this HTML could interfere with PrismJS's autoloader functionality, potentially causing syntax highlighting failures or unexpected behavior in the app's UI. This requires the user to actively preview the malicious HTML response, making exploitation conditional on user interaction and Yaak's feature set.Exploitation Impact Assessment
Vulnerability Details
CVE-2024-53382package-lock.jsonChanges Made
This automated fix addresses the vulnerability by applying security best practices.
Files Modified
package-lock.jsonpackage.jsonVerification
This fix has been automatically verified through:
🤖 This PR was automatically generated.
🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.