Description
The dot package v1.1.2 uses Function() to compile templates. This can be exploited by the attacker if they can control the given template or if they can control the value set on Object.prototype.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-1949 | The dot package v1.1.2 uses Function() to compile templates. This can be exploited by the attacker if they can control the given template or if they can control the value set on Object.prototype. |
Github GHSA |
GHSA-297x-8xj4-vcxv | Improper Control of Generation of Code in doT |
References
| Link | Providers |
|---|---|
| https://hackerone.com/reports/390929 |
|
History
No history.
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2024-08-04T09:48:25.637Z
Reserved: 2020-01-28T00:00:00.000Z
Link: CVE-2020-8141
No data.
Status : Modified
Published: 2020-03-15T18:15:11.287
Modified: 2024-11-21T05:38:22.380
Link: CVE-2020-8141
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA