Логотип exploitDog
bind:CVE-2024-27307
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-27307

Количество 4

Количество 4

redhat логотип

CVE-2024-27307

почти 2 года назад

JSONata is a JSON query and transformation language. Starting in version 1.4.0 and prior to version 1.8.7 and 2.0.4, a malicious expression can use the transform operator to override properties on the `Object` constructor and prototype. This may lead to denial of service, remote code execution or other unexpected behavior in applications that evaluate user-provided JSONata expressions. This issue has been fixed in JSONata versions 1.8.7 and 2.0.4. Applications that evaluate user-provided expressions should update ASAP to prevent exploitation. As a workaround, one may apply the patch manually.

CVSS3: 8.6
EPSS: Низкий
nvd логотип

CVE-2024-27307

почти 2 года назад

JSONata is a JSON query and transformation language. Starting in version 1.4.0 and prior to version 1.8.7 and 2.0.4, a malicious expression can use the transform operator to override properties on the `Object` constructor and prototype. This may lead to denial of service, remote code execution or other unexpected behavior in applications that evaluate user-provided JSONata expressions. This issue has been fixed in JSONata versions 1.8.7 and 2.0.4. Applications that evaluate user-provided expressions should update ASAP to prevent exploitation. As a workaround, one may apply the patch manually.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-fqg8-vfv7-8fj8

почти 2 года назад

JSONata expression can pollute the "Object" prototype

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2024-02116

почти 2 года назад

Уязвимость программного средства преобразования json-данных JSONata, связанная с неконтролируемым изменением атрибутов прототипа объекта, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2024-27307

JSONata is a JSON query and transformation language. Starting in version 1.4.0 and prior to version 1.8.7 and 2.0.4, a malicious expression can use the transform operator to override properties on the `Object` constructor and prototype. This may lead to denial of service, remote code execution or other unexpected behavior in applications that evaluate user-provided JSONata expressions. This issue has been fixed in JSONata versions 1.8.7 and 2.0.4. Applications that evaluate user-provided expressions should update ASAP to prevent exploitation. As a workaround, one may apply the patch manually.

CVSS3: 8.6
2%
Низкий
почти 2 года назад
nvd логотип
CVE-2024-27307

JSONata is a JSON query and transformation language. Starting in version 1.4.0 and prior to version 1.8.7 and 2.0.4, a malicious expression can use the transform operator to override properties on the `Object` constructor and prototype. This may lead to denial of service, remote code execution or other unexpected behavior in applications that evaluate user-provided JSONata expressions. This issue has been fixed in JSONata versions 1.8.7 and 2.0.4. Applications that evaluate user-provided expressions should update ASAP to prevent exploitation. As a workaround, one may apply the patch manually.

CVSS3: 9.8
2%
Низкий
почти 2 года назад
github логотип
GHSA-fqg8-vfv7-8fj8

JSONata expression can pollute the "Object" prototype

CVSS3: 9.8
2%
Низкий
почти 2 года назад
fstec логотип
BDU:2024-02116

Уязвимость программного средства преобразования json-данных JSONata, связанная с неконтролируемым изменением атрибутов прототипа объекта, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании

CVSS3: 9.8
2%
Низкий
почти 2 года назад

Уязвимостей на страницу