Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-32304

Опубликовано: 12 мар. 2026
Источник: redhat
CVSS3: 7.5

Описание

A flaw was found in Locutus, a JavaScript library that provides standard library functions. The create_function function in Locutus passes user-supplied arguments and code directly to the JavaScript Function constructor without proper sanitization. This vulnerability allows a remote attacker to execute arbitrary code within the application, potentially leading to full system compromise or data manipulation.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Logging Subsystem for Red Hat OpenShiftopenshift-logging/elasticsearch6-rhel9Affected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/elasticsearch-operator-bundleAffected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/elasticsearch-proxy-rhel9Affected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/elasticsearch-rhel9-operatorAffected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/kibana6-rhel8Affected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/logging-curator5-rhel9Affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-88
https://bugzilla.redhat.com/show_bug.cgi?id=2447200locutusjs: Locutus: Arbitrary code execution via unsanitized parameters in create_function

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
13 дней назад

Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. Prior to 3.0.14, the create_function(args, code) function passes both parameters directly to the Function constructor without any sanitization, allowing arbitrary code execution. This is distinct from CVE-2026-29091 which was call_user_func_array using eval() in v2.x. This finding affects create_function using new Function() in v3.x. This vulnerability is fixed in 3.0.14.

CVSS3: 9.8
github
14 дней назад

Locutus vulnerable to RCE via unsanitized input in create_function()

7.5 High

CVSS3