Описание
An attacker can use the format parameter to inject arbitrary commands in the npm package morgan < 1.9.1.
The Node.js morgan package, before version 1.9.1, does not properly sanitize input in the compile() function, allowing for potential execution of code. This vulnerability can only be exploited by attackers with the ability to provide input to the compile() function or in combination with another prototype pollution vulnerability.
Отчет
This vulnerability affects the nodejs-morgan RPM, used by the openshift3/logging-auth-proxy container in OpenShift Container Platform versions 3.4 through 3.10. The openshift3/logging-auth-proxy container does not expose the vulnerable compile() function, hence this vulnerability can only be exploited in combination with another prototype pollution vulnerability. Red Hat Product Security has rated this issue as having a security impact of Low. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat OpenShift Container Platform 3.10 | nodejs-morgan | Affected | ||
| Red Hat OpenShift Container Platform 3.4 | nodejs-morgan | Will not fix | ||
| Red Hat OpenShift Container Platform 3.5 | nodejs-morgan | Will not fix | ||
| Red Hat OpenShift Container Platform 3.6 | nodejs-morgan | Will not fix | ||
| Red Hat OpenShift Container Platform 3.7 | nodejs-morgan | Will not fix | ||
| Red Hat OpenShift Container Platform 3.9 | nodejs-morgan | Affected |
Показывать по
Дополнительная информация
Статус:
5 Medium
CVSS3
Связанные уязвимости
An attacker can use the format parameter to inject arbitrary commands in the npm package morgan < 1.9.1.
5 Medium
CVSS3