Описание
[thi.ng/egf] Potential arbitrary code execution of #gpg-tagged property values
Impact
Potential for arbitrary code execution in #gpg-tagged property values (only if decrypt: true option is enabled)
Patches
A fix has already been released as v0.4.0
Workarounds
By default, EGF parse functions do NOT attempt to decrypt values (since GPG is only available in non-browser env).
However, if GPG encrypted values are used/required:
- Perform a regex search for
#gpg-tagged values in the EGF source file/string and check for backtick (`) chars in the encrypted value string - Replace/remove them or skip parsing if present...
References
https://github.com/thi-ng/umbrella/security/advisories/GHSA-rj44-gpjc-29r7#advisory-comment-65261
For more information
If you have any questions or comments about this advisory, please open an issue in the thi.ng/umbrella repo, of which this package is part of.
Ссылки
- https://github.com/thi-ng/umbrella/security/advisories/GHSA-rj44-gpjc-29r7
- https://nvd.nist.gov/vuln/detail/CVE-2021-21412
- https://github.com/thi-ng/umbrella/commit/88f61656e5f5cfba960013b8133186389efaf243
- https://github.com/thi-ng/umbrella/blob/develop/packages/egf/CHANGELOG.md#040-2021-03-27
- https://www.npmjs.com/package/@thi.ng/egf
Пакеты
@thi.ng/egf
< 0.4.0
0.4.0
Связанные уязвимости
Potential for arbitrary code execution in npm package @thi.ng/egf `#gpg`-tagged property values (only if `decrypt: true` option is enabled). PR with patch has been submitted and will has been released as of v0.4.0 By default the EGF parse functions do NOT attempt to decrypt values (since GPG only available in non-browser env). However, if GPG encrypted values are used/required: 1. Perform a regex search for `#gpg`-tagged values in the EGF source file/string and check for backtick (\`) chars in the encrypted value string 2. Replace/remove them or skip parsing if present.