We discovered a minor vulnerability that might affect some apps using ReactDOMServer. We are releasing a patch version for every affected React minor release so that you can upgrade with no friction. Read on for more details.

Short Description

Today, we are releasing a fix for a vulnerability we discovered in the react-dom/server implementation. It was introduced with the version 16.0.0 and has existed in all subsequent releases until today.

This vulnerability can only affect some server-rendered React apps. Purely client-rendered apps are not affected. Additionally, we expect that most server-rendered apps don’t contain the vulnerable pattern described below. Nevertheless, we recommend to follow the mitigation instructions at the earliest opportunity.

While we were investigating this vulnerability, we found similar vulnerabilities in a few other popular front-end libraries. We have coordinated this release together with Vue and Preact releases fixing the same issue. The tracking number for this vulnerability is CVE-2018-6341 .

Mitigation

We have prepared a patch release with a fix for every affected minor version.

If you’re using react-dom/server with this version:

react-dom@16.0.0

Update to this version instead:

react-dom@16.0.1 (contains the mitigation)

If you’re using react-dom/server with one of these versions:

react-dom@16.1.0

react-dom@16.1.1

Update to this version instead:

react-dom@16.1.2 (contains the mitigation)

If you’re using react-dom/server with this version:

react-dom@16.2.0

Update to this version instead:

react-dom@16.2.1 (contains the mitigation)

If you’re using react-dom/server with one of these versions:

react-dom@16.3.0

react-dom@16.3.1

react-dom@16.3.2

Update to this version instead:

react-dom@16.3.3 (contains the mitigation)

If you’re using react-dom/server with one of these versions:

react-dom@16.4.0

react-dom@16.4.1

Update to this version instead:

react-dom@16.4.2 (contains the mitigation)

If you’re using a newer version of react-dom , no action is required.

Note that only the react-dom package needs to be updated.

Detailed Description

Your app might be affected by this vulnerability only if both of these two conditions are true:

Your app is being rendered to HTML using ReactDOMServer API , and

, and Your app includes a user-supplied attribute name in an HTML tag.

Specifically, the vulnerable pattern looks like this:

let props = { } ; props [ userProvidedData ] = "hello" ; let element = < div { ... props } /> ; let html = ReactDOMServer . renderToString ( element ) ;

In order to exploit it, the attacker would need to craft a special attribute name that triggers an XSS vulnerability. For example:

let userProvidedData = '></div><script>alert("hi")</script>' ;

In the vulnerable versions of react-dom/server , the output would let the attacker inject arbitrary markup:

< div > </ div > < script > alert ( "hi" ) </ script >

In the versions after the vulnerability was fixed (and before it was introduced), attributes with invalid names are skipped:

< div > </ div >

You would also see a warning about an invalid attribute name.

Note that we expect attribute names based on user input to be very rare in practice. It doesn’t serve any common practical use case, and has other potential security implications that React can’t guard against.

Installation

React v16.4.2 is available on the npm registry.

To install React 16 with Yarn, run:

yarn add react@^16.4.2 react-dom@^16.4.2

To install React 16 with npm, run:

npm install --save react@^16.4.2 react-dom@^16.4.2

We also provide UMD builds of React via a CDN:

< script crossorigin src = " https://unpkg.com/react@16/umd/react.production.min.js " > </ script > < script crossorigin src = " https://unpkg.com/react-dom@16/umd/react-dom.production.min.js " > </ script >

Refer to the documentation for detailed installation instructions.

Changelog

React DOM Server