Version in base suite: 0.18.0+~cs1.19.1-3 Base version: node-send_0.18.0+~cs1.19.1-3 Target version: node-send_0.18.0+~cs1.19.1-3+deb12u1 Base file: /srv/ftp-master.debian.org/ftp/pool/main/n/node-send/node-send_0.18.0+~cs1.19.1-3.dsc Target file: /srv/ftp-master.debian.org/policy/pool/main/n/node-send/node-send_0.18.0+~cs1.19.1-3+deb12u1.dsc changelog | 6 ++++++ patches/CVE-2024-43799.patch | 43 +++++++++++++++++++++++++++++++++++++++++++ patches/series | 1 + 3 files changed, 50 insertions(+) diff -Nru node-send-0.18.0+~cs1.19.1/debian/changelog node-send-0.18.0+~cs1.19.1/debian/changelog --- node-send-0.18.0+~cs1.19.1/debian/changelog 2022-05-02 15:41:27.000000000 +0000 +++ node-send-0.18.0+~cs1.19.1/debian/changelog 2025-04-07 13:25:46.000000000 +0000 @@ -1,3 +1,9 @@ +node-send (0.18.0+~cs1.19.1-3+deb12u1) bookworm; urgency=medium + + * Fix XSS issue (Closes: #1081483, CVE-2024-43799) + + -- Yadd Mon, 07 Apr 2025 15:25:46 +0200 + node-send (0.18.0+~cs1.19.1-3) unstable; urgency=medium * Add Breaks: node-express < 4.18.1~ diff -Nru node-send-0.18.0+~cs1.19.1/debian/patches/CVE-2024-43799.patch node-send-0.18.0+~cs1.19.1/debian/patches/CVE-2024-43799.patch --- node-send-0.18.0+~cs1.19.1/debian/patches/CVE-2024-43799.patch 1970-01-01 00:00:00.000000000 +0000 +++ node-send-0.18.0+~cs1.19.1/debian/patches/CVE-2024-43799.patch 2025-04-07 13:25:46.000000000 +0000 @@ -0,0 +1,43 @@ +Description: fix XSS issue CVE-2024-43799 +Author: Ulises Gascón , + Chris de Almeida +Origin: upstream, https://github.com/pillarjs/send/commit/ae4f2989 +Bug: https://github.com/pillarjs/send/security/advisories/GHSA-m6fv-jmcg-4jfg +Bug-Debian: https://bugs.debian.org/1081483 +Forwarded: not-needed +Applied-Upstream: 0.19.0, commit:ae4f2989 +Reviewed-By: Yadd +Last-Update: 2025-04-07 + +--- a/index.js ++++ b/index.js +@@ -482,8 +482,7 @@ + } + + var loc = encodeUrl(collapseLeadingSlashes(this.path + '/')) +- var doc = createHtmlDocument('Redirecting', 'Redirecting to ' + +- escapeHtml(loc) + '') ++ var doc = createHtmlDocument('Redirecting', 'Redirecting to ' + escapeHtml(loc)) + + // redirect + res.statusCode = 301 +--- a/test/send.js ++++ b/test/send.js +@@ -358,7 +358,7 @@ + .get('/pets') + .expect('Location', '/pets/') + .expect('Content-Type', /html/) +- .expect(301, />Redirecting to \/pets\/<\/a>Redirecting to \/pets\/Redirecting to \/snow%20%E2%98%83\/<\/a>Redirecting to \/snow%20%E2%98%83\/