Squirrelly is a template engine implemented in JavaScript that works out of the box with ExpressJS. Squirrelly mixes pure template data with engine configuration options through the Express render API. By overwriting internal configuration options remote code execution may be triggered in downstream applications. This issue is fixed in version 9.0.0. For complete details refer to the referenced GHSL-2021-023.
References
Configurations
History
21 Nov 2024, 06:07
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/squirrellyjs/squirrelly/commit/c12418a026f73df645ba927fd29358efe02fed1e - | |
References | () https://github.com/squirrellyjs/squirrelly/commit/dca7a1e7ee91d8a6ffffb655f3f15647486db9da - | |
References | () https://github.com/squirrellyjs/squirrelly/pull/254 - | |
References | () https://securitylab.github.com/advisories/GHSL-2021-023-squirrelly/ - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 8.0 |
Information
Published : 2021-05-14 19:15
Updated : 2024-11-21 06:07
NVD link : CVE-2021-32819
Mitre link : CVE-2021-32819
CVE.ORG link : CVE-2021-32819
JSON object : View
Products Affected
squirrelly
- squirrelly
CWE