Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-7660

Опубликовано: 01 апр. 2020
Источник: redhat
CVSS3: 8.1
EPSS Низкий

Описание

serialize-javascript prior to 3.1.0 allows remote attackers to inject arbitrary code via the function "deleteFunctions" within "index.js".

A flaw was found in the serialize-javascript before version 3.1.0. This flaw allows remote attackers to inject arbitrary code via the function "deleteFunctions" within "index.js."

Отчет

Red Hat Quay includes serialize-javascript as a dependency of webpack which is only used at build time. The vulnerable library is not used at runtime meaning this has a low impact on Red Hat Quay. The currently supported versions of Container Native Virtualization 2 are not affected by this flaw. However, version 2.0, which is no longer supported, is affected. In OpenShift distributed tracing there is bundled vulnerable version of the serialize-javascript Nodejs package, however access to the vulnerable function is restricted and protected by OpenShift OAuth, hence the impact by this vulnerability is reduced to Low. In Red Hat OpenShift Logging the openshift-logging/kibana6-rhel8 container bundles many nodejs packages as a build time dependencies, including the serialize-javascript package. The vulnerable code is not used hence the impact to OpenShift Logging by this vulnerability is Low.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Logging Subsystem for Red Hat OpenShiftopenshift-logging/kibana6-rhel8Not affected
Red Hat OpenShift Container Platform 4openshift4/ose-grafanaWill not fix
Red Hat OpenShift Container Platform 4openshift4/ose-prometheusFix deferred
Red Hat OpenShift distributed tracing 2rhosdt/jaeger-all-in-one-rhel8Fix deferred
Red Hat OpenShift Virtualization 1kubevirt-web-ui-containerWill not fix
Red Hat OpenShift Virtualization 2kubevirt-web-ui-containerNot affected
Red Hat Quay 3nodejs-serialize-javascriptFix deferred
OpenShift Service Mesh 1.0servicemesh-grafanaFixedRHSA-2020:286107.07.2020
OpenShift Service Mesh 1.1servicemesh-grafanaFixedRHSA-2020:279601.07.2020

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-502
https://bugzilla.redhat.com/show_bug.cgi?id=1844228npm-serialize-javascript: allows remote attackers to inject arbitrary code via the function deleteFunctions within index.js

EPSS

Процентиль: 85%
0.02351
Низкий

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 8.1
nvd
больше 5 лет назад

serialize-javascript prior to 3.1.0 allows remote attackers to inject arbitrary code via the function "deleteFunctions" within "index.js".

CVSS3: 8.1
github
больше 5 лет назад

Insecure serialization leading to RCE in serialize-javascript

CVSS3: 8.1
fstec
больше 4 лет назад

Уязвимость функции deleteFunctions библиотеки serialize-javascript прикладного программного обеспечения Аврора Центр, связанная с ошибками управления генерацией кода, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 85%
0.02351
Низкий

8.1 High

CVSS3