Description
An issue was discovered in the serialize-to-js package 0.5.0 for Node.js. Untrusted data passed into the deserialize() function can be exploited to achieve arbitrary code execution by passing a JavaScript Object with an Immediately Invoked Function Expression (IIFE).
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-0297 | An issue was discovered in the serialize-to-js package 0.5.0 for Node.js. Untrusted data passed into the deserialize() function can be exploited to achieve arbitrary code execution by passing a JavaScript Object with an Immediately Invoked Function Expression (IIFE). |
Github GHSA |
GHSA-mm62-wxc8-cf7m | Code Execution Through IIFE in serialize-to-js |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T15:18:48.874Z
Reserved: 2017-02-10T00:00:00.000Z
Link: CVE-2017-5954
No data.
Status : Modified
Published: 2017-02-10T07:59:00.310
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-5954
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA