CVE-2022-25760

All versions of package accesslog are vulnerable to Arbitrary Code Injection due to the usage of the Function constructor without input sanitization. If (attacker-controlled) user input is given to the format option of the package's exported constructor function, it is possible for an attacker to execute arbitrary JavaScript code on the host that this package is being run on.
Configurations

Configuration 1 (hide)

cpe:2.3:a:accesslog_project:accesslog:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:52

Type Values Removed Values Added
References () https://github.com/carlos8f/node-accesslog/blob/master/lib/compile.js%23L6 - Broken Link () https://github.com/carlos8f/node-accesslog/blob/master/lib/compile.js%23L6 - Broken Link
References () https://snyk.io/vuln/SNYK-JS-ACCESSLOG-2312099 - Exploit, Third Party Advisory () https://snyk.io/vuln/SNYK-JS-ACCESSLOG-2312099 - Exploit, Third Party Advisory
CVSS v2 : 10.0
v3 : 9.8
v2 : 10.0
v3 : 7.1

Information

Published : 2022-03-17 12:15

Updated : 2024-11-21 06:52


NVD link : CVE-2022-25760

Mitre link : CVE-2022-25760

CVE.ORG link : CVE-2022-25760


JSON object : View

Products Affected

accesslog_project

  • accesslog
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')