Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-7677

Опубликовано: 25 июл. 2022
Источник: redhat
CVSS3: 9.8

Описание

This affects the package thenify before 3.3.1. The name argument provided to the package can be controlled by users without any sanitization, and this is provided to the eval function without any sanitization.

A flaw was found in the thenify package. Users can control the name argument provided to the package without any sanitization, and this is provided to the eval function without any sanitization, which leads to arbitrary code execution.

Отчет

Red Hat Service Registry does not directly use the vulnerable code, but has a dependency on the affected package, and as such is affected at Low impact. Red Hat Service Mesh (OSSM) is closed as Won't Do as Thenify is hosted only by Cucumber, which is a development dependency for automation testing and is not part of the production container. As an aside, this is already resolved in the upcoming 2.3 version.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Service Mesh 2openshift-service-mesh/kiali-rhel8Affected
Red Hat build of Apicurio Registry 2thenifyAffected
Red Hat Integration Camel K 1thenifyNot affected
Red Hat Integration Service RegistrythenifyOut of support scope
Red Hat OpenShift Container Platform 4openshift4/ose-consoleAffected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-78
https://bugzilla.redhat.com/show_bug.cgi?id=2127348thenify: Arbitrary Code Execution in thenify

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 8.6
ubuntu
больше 3 лет назад

This affects the package thenify before 3.3.1. The name argument provided to the package can be controlled by users without any sanitization, and this is provided to the eval function without any sanitization.

CVSS3: 8.6
nvd
больше 3 лет назад

This affects the package thenify before 3.3.1. The name argument provided to the package can be controlled by users without any sanitization, and this is provided to the eval function without any sanitization.

CVSS3: 8.6
debian
больше 3 лет назад

This affects the package thenify before 3.3.1. The name argument provi ...

CVSS3: 9.8
github
больше 3 лет назад

thenify before 3.3.1 made use of unsafe calls to `eval`.

9.8 Critical

CVSS3