Description
All versions of package accesslog are vulnerable to Arbitrary Code Injection due to the usage of the Function constructor without input sanitization. If (attacker-controlled) user input is given to the format option of the package's exported constructor function, it is possible for an attacker to execute arbitrary JavaScript code on the host that this package is being run on.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-1380 | All versions of package accesslog are vulnerable to Arbitrary Code Injection due to the usage of the Function constructor without input sanitization. If (attacker-controlled) user input is given to the format option of the package's exported constructor function, it is possible for an attacker to execute arbitrary JavaScript code on the host that this package is being run on. |
Github GHSA |
GHSA-8m2f-74r2-x3f2 | Code injection in accesslog |
References
History
No history.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-09-16T23:50:32.417Z
Reserved: 2022-02-24T00:00:00.000Z
Link: CVE-2022-25760
No data.
Status : Modified
Published: 2022-03-17T12:15:08.293
Modified: 2024-11-21T06:52:57.213
Link: CVE-2022-25760
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA