Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rj44-gpjc-29r7

Опубликовано: 06 апр. 2021
Источник: github
Github: Прошло ревью
CVSS3: 6.4

Описание

[thi.ng/egf] Potential arbitrary code execution of #gpg-tagged property values

Impact

Potential for arbitrary code execution in #gpg-tagged property values (only if decrypt: true option is enabled)

Patches

A fix has already been released as v0.4.0

Workarounds

By default, EGF parse functions do NOT attempt to decrypt values (since GPG is only available in non-browser env).

However, if GPG encrypted values are used/required:

  1. Perform a regex search for #gpg-tagged values in the EGF source file/string and check for backtick (`) chars in the encrypted value string
  2. Replace/remove them or skip parsing if present...

References

https://github.com/thi-ng/umbrella/security/advisories/GHSA-rj44-gpjc-29r7#advisory-comment-65261

For more information

If you have any questions or comments about this advisory, please open an issue in the thi.ng/umbrella repo, of which this package is part of.

Пакеты

Наименование

@thi.ng/egf

npm
Затронутые версииВерсия исправления

< 0.4.0

0.4.0

EPSS

Процентиль: 77%
0.01082
Низкий

6.4 Medium

CVSS3

Дефекты

CWE-78

Связанные уязвимости

CVSS3: 6.4
nvd
почти 5 лет назад

Potential for arbitrary code execution in npm package @thi.ng/egf `#gpg`-tagged property values (only if `decrypt: true` option is enabled). PR with patch has been submitted and will has been released as of v0.4.0 By default the EGF parse functions do NOT attempt to decrypt values (since GPG only available in non-browser env). However, if GPG encrypted values are used/required: 1. Perform a regex search for `#gpg`-tagged values in the EGF source file/string and check for backtick (\`) chars in the encrypted value string 2. Replace/remove them or skip parsing if present.

EPSS

Процентиль: 77%
0.01082
Низкий

6.4 Medium

CVSS3

Дефекты

CWE-78