CVE-2020-7677

This affects the package thenify before 3.3.1. The name argument provided to the package can be controlled by users without any sanitization, and this is provided to the eval function without any sanitization.
Configurations

Configuration 1 (hide)

cpe:2.3:a:thenify_project:thenify:*:*:*:*:*:node.js:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*

History

21 Nov 2024, 05:37

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 9.8
v2 : unknown
v3 : 8.6
References () https://github.com/thenables/thenify/blob/master/index.js%23L17 - Broken Link () https://github.com/thenables/thenify/blob/master/index.js%23L17 - Broken Link
References () https://github.com/thenables/thenify/commit/0d94a24eb933bc835d568f3009f4d269c4c4c17a - Patch () https://github.com/thenables/thenify/commit/0d94a24eb933bc835d568f3009f4d269c4c4c17a - Patch
References () https://lists.debian.org/debian-lts-announce/2022/09/msg00039.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2022/09/msg00039.html - Mailing List, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTEUUTNIEBHGKUKKLNUZSV7IEP6IP3Q3/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTEUUTNIEBHGKUKKLNUZSV7IEP6IP3Q3/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UM6XJ73Q3NAM5KSGCOKJ2ZIA6GUWUJLK/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UM6XJ73Q3NAM5KSGCOKJ2ZIA6GUWUJLK/ -
References () https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-572317 - Exploit, Third Party Advisory () https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-572317 - Exploit, Third Party Advisory
References () https://security.snyk.io/vuln/SNYK-JS-THENIFY-571690 - Exploit, Third Party Advisory () https://security.snyk.io/vuln/SNYK-JS-THENIFY-571690 - Exploit, Third Party Advisory

07 Nov 2023, 03:26

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UM6XJ73Q3NAM5KSGCOKJ2ZIA6GUWUJLK/', 'name': 'FEDORA-2023-18fd476362', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MTEUUTNIEBHGKUKKLNUZSV7IEP6IP3Q3/', 'name': 'FEDORA-2023-ce8943223c', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTEUUTNIEBHGKUKKLNUZSV7IEP6IP3Q3/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UM6XJ73Q3NAM5KSGCOKJ2ZIA6GUWUJLK/ -

Information

Published : 2022-07-25 14:15

Updated : 2024-11-21 05:37


NVD link : CVE-2020-7677

Mitre link : CVE-2020-7677

CVE.ORG link : CVE-2020-7677


JSON object : View

Products Affected

thenify_project

  • thenify

fedoraproject

  • fedora

debian

  • debian_linux