Eval injection vulnerability in the internals.batch function in lib/batch.js in the bassmaster plugin before 1.5.2 for the hapi server framework for Node.js allows remote attackers to execute arbitrary Javascript code via unspecified vectors.
References
Configurations
History
21 Nov 2024, 02:16
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2014/09/30/10 - Mailing List, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/70180 - Third Party Advisory, VDB Entry | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/96730 - Third Party Advisory, VDB Entry | |
References | () https://github.com/hapijs/bassmaster/commit/b751602d8cb7194ee62a61e085069679525138c4 - Exploit | |
References | () https://nodesecurity.io/advisories/bassmaster_js_injection - Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/40689/ - Third Party Advisory, VDB Entry |
Information
Published : 2014-10-08 17:55
Updated : 2024-11-21 02:16
NVD link : CVE-2014-7205
Mitre link : CVE-2014-7205
CVE.ORG link : CVE-2014-7205
JSON object : View
Products Affected
bassmaster_project
- bassmaster
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')