Описание
This affects the package thenify before 3.3.1. The name argument provided to the package can be controlled by users without any sanitization, and this is provided to the eval function without any sanitization.
A flaw was found in the thenify package. Users can control the name argument provided to the package without any sanitization, and this is provided to the eval function without any sanitization, which leads to arbitrary code execution.
Отчет
Red Hat Service Registry does not directly use the vulnerable code, but has a dependency on the affected package, and as such is affected at Low impact. Red Hat Service Mesh (OSSM) is closed as Won't Do as Thenify is hosted only by Cucumber, which is a development dependency for automation testing and is not part of the production container. As an aside, this is already resolved in the upcoming 2.3 version.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| OpenShift Service Mesh 2 | openshift-service-mesh/kiali-rhel8 | Affected | ||
| Red Hat build of Apicurio Registry 2 | thenify | Affected | ||
| Red Hat Integration Camel K 1 | thenify | Not affected | ||
| Red Hat Integration Service Registry | thenify | Out of support scope | ||
| Red Hat OpenShift Container Platform 4 | openshift4/ose-console | Affected |
Показывать по
Дополнительная информация
Статус:
9.8 Critical
CVSS3
Связанные уязвимости
This affects the package thenify before 3.3.1. The name argument provided to the package can be controlled by users without any sanitization, and this is provided to the eval function without any sanitization.
This affects the package thenify before 3.3.1. The name argument provided to the package can be controlled by users without any sanitization, and this is provided to the eval function without any sanitization.
This affects the package thenify before 3.3.1. The name argument provi ...
thenify before 3.3.1 made use of unsafe calls to `eval`.
9.8 Critical
CVSS3