Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-q4v7-4rhw-9hqm

Опубликовано: 18 июл. 2018
Источник: github
Github: Прошло ревью
CVSS3: 9.8

Описание

Code Execution through IIFE in node-serialize

Affected versions of node-serialize can be abused to execute arbitrary code via an immediately invoked function expression (IIFE) if untrusted user input is passed into unserialize().

Recommendation

There is no direct patch for this issue. The package author has reviewed this advisory, and provided the following recommendation:

To avoid the security issues, at least one of the following methods should be taken: 1. Make sure to send serialized strings internally, isolating them from potential hackers. For example, only sending the strings from backend to fronend and always using HTTPS instead of HTTP. 2. Introduce public-key cryptosystems (e.g. RSA) to ensure the strings not being tampered with.

Пакеты

Наименование

node-serialize

npm
Затронутые версииВерсия исправления

<= 0.0.4

Отсутствует

EPSS

Процентиль: 99%
0.7793
Высокий

9.8 Critical

CVSS3

Дефекты

CWE-502

Связанные уязвимости

CVSS3: 9.8
nvd
почти 9 лет назад

An issue was discovered in the node-serialize package 0.0.4 for Node.js. Untrusted data passed into the unserialize() function can be exploited to achieve arbitrary code execution by passing a JavaScript Object with an Immediately Invoked Function Expression (IIFE).

EPSS

Процентиль: 99%
0.7793
Высокий

9.8 Critical

CVSS3

Дефекты

CWE-502