Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mm62-wxc8-cf7m

Опубликовано: 18 июл. 2018
Источник: github
Github: Прошло ревью
CVSS3: 9.8

Описание

Code Execution Through IIFE in serialize-to-js

Affected versions of serialize-to-js may be vulnerable to arbitrary code execution through an Immediately Invoked Function Expression (IIFE).

Proof of Concept

var payload = "{e: (function(){ eval('console.log(`exploited`)') })() }" var serialize = require('serialize-to-js'); serialize.deserialize(payload);

Recommendation

Update to version 1.0.0, or later, and review this disclaimer from the author.

Пакеты

Наименование

serialize-to-js

npm
Затронутые версииВерсия исправления

< 1.0.0

1.0.0

EPSS

Процентиль: 55%
0.00329
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-502

Связанные уязвимости

CVSS3: 9.8
nvd
почти 9 лет назад

An issue was discovered in the serialize-to-js package 0.5.0 for Node.js. Untrusted data passed into the deserialize() function can be exploited to achieve arbitrary code execution by passing a JavaScript Object with an Immediately Invoked Function Expression (IIFE).

EPSS

Процентиль: 55%
0.00329
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-502