CVE-2017-5954

An issue was discovered in the serialize-to-js package 0.5.0 for Node.js. Untrusted data passed into the deserialize() function can be exploited to achieve arbitrary code execution by passing a JavaScript Object with an Immediately Invoked Function Expression (IIFE).
Configurations

Configuration 1 (hide)

cpe:2.3:a:serialize-to-js_project:serialize-to-js:0.5.0:*:*:*:*:node.js:*:*

History

21 Nov 2024, 03:28

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/96223 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/96223 - Third Party Advisory, VDB Entry
References () https://github.com/commenthol/serialize-to-js/issues/1 - Issue Tracking, Patch, Third Party Advisory () https://github.com/commenthol/serialize-to-js/issues/1 - Issue Tracking, Patch, Third Party Advisory
References () https://opsecx.com/index.php/2017/02/08/exploiting-node-js-deserialization-bug-for-remote-code-execution/ - Exploit, Third Party Advisory () https://opsecx.com/index.php/2017/02/08/exploiting-node-js-deserialization-bug-for-remote-code-execution/ - Exploit, Third Party Advisory

Information

Published : 2017-02-10 07:59

Updated : 2024-11-21 03:28


NVD link : CVE-2017-5954

Mitre link : CVE-2017-5954

CVE.ORG link : CVE-2017-5954


JSON object : View

Products Affected

serialize-to-js_project

  • serialize-to-js
CWE
CWE-502

Deserialization of Untrusted Data