Описание
Potential for arbitrary code execution in npm package @thi.ng/egf #gpg-tagged property values (only if decrypt: true option is enabled). PR with patch has been submitted and will has been released as of v0.4.0 By default the EGF parse functions do NOT attempt to decrypt values (since GPG only available in non-browser env). However, if GPG encrypted values are used/required: 1. Perform a regex search for #gpg-tagged values in the EGF source file/string and check for backtick (`) chars in the encrypted value string 2. Replace/remove them or skip parsing if present.
Ссылки
- Release NotesThird Party Advisory
- PatchThird Party Advisory
- PatchThird Party Advisory
- Release NotesThird Party Advisory
- PatchThird Party Advisory
- PatchThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 0.4.0 (исключая)
cpe:2.3:a:\@thi.ng\/egf_project:\@thi.ng\/egf:*:*:*:*:*:node.js:*:*
EPSS
Процентиль: 77%
0.01082
Низкий
6.4 Medium
CVSS3
8.8 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-78
Связанные уязвимости
CVSS3: 6.4
github
почти 5 лет назад
[thi.ng/egf] Potential arbitrary code execution of `#gpg`-tagged property values
EPSS
Процентиль: 77%
0.01082
Низкий
6.4 Medium
CVSS3
8.8 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-78