CVE-2016-10546

An arbitrary code injection vector was found in PouchDB 6.0.4 and lesser via the map/reduce functions used in PouchDB temporary views and design documents. The code execution engine for this branch is not properly sandboxed and may be used to run arbitrary JavaScript as well as system commands.
References
Link Resource
https://nodesecurity.io/advisories/143 Third Party Advisory
https://nodesecurity.io/advisories/143 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:pouchdb:pouchdb:*:*:*:*:*:node.js:*:*

History

21 Nov 2024, 02:44

Type Values Removed Values Added
References () https://nodesecurity.io/advisories/143 - Third Party Advisory () https://nodesecurity.io/advisories/143 - Third Party Advisory

Information

Published : 2018-05-31 20:29

Updated : 2024-11-21 02:44


NVD link : CVE-2016-10546

Mitre link : CVE-2016-10546

CVE.ORG link : CVE-2016-10546


JSON object : View

Products Affected

pouchdb

  • pouchdb
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')