Versions of the package eta before 2.0.0 are vulnerable to Remote Code Execution (RCE) by overwriting template engine configuration variables with view options received from The Express render API.
**Note:** This is exploitable only for users who are rendering templates with user-defined data.
References
Link | Resource |
---|---|
https://github.com/eta-dev/eta/blob/9c8e4263d3a559444a3881a85c1607bf344d0b28/src/compile-string.ts%23L21 | Broken Link |
https://github.com/eta-dev/eta/blob/9c8e4263d3a559444a3881a85c1607bf344d0b28/src/file-handlers.ts%23L182 | Broken Link |
https://github.com/eta-dev/eta/commit/5651392462ee0ff19d77c8481081a99e5b9138dd | Patch Third Party Advisory |
https://security.snyk.io/vuln/SNYK-JS-ETA-2936803 | Third Party Advisory |
Configurations
History
07 Nov 2023, 03:44
Type | Values Removed | Values Added |
---|---|---|
Summary | Versions of the package eta before 2.0.0 are vulnerable to Remote Code Execution (RCE) by overwriting template engine configuration variables with view options received from The Express render API. **Note:** This is exploitable only for users who are rendering templates with user-defined data. |
Information
Published : 2023-01-30 05:15
Updated : 2024-02-28 19:51
NVD link : CVE-2022-25967
Mitre link : CVE-2022-25967
CVE.ORG link : CVE-2022-25967
JSON object : View
Products Affected
eta.js
- eta
CWE