CVE-2024-21541

All versions of the package dom-iterator are vulnerable to Arbitrary Code Execution due to use of the Function constructor without complete input sanitization. Function generates a new function body and thus care must be given to ensure that the inputs to Function are not attacker-controlled. The risks involved are similar to that of allowing attacker-controlled input to reach eval.
References
Link Resource
https://security.snyk.io/vuln/SNYK-JS-DOMITERATOR-6157199 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:matthewmueller:dom-iterator:*:*:*:*:*:node.js:*:*

History

19 Nov 2024, 16:20

Type Values Removed Values Added
CPE cpe:2.3:a:matthewmueller:dom-iterator:*:*:*:*:*:node.js:*:*
CVSS v2 : unknown
v3 : 7.3
v2 : unknown
v3 : 9.8
References () https://security.snyk.io/vuln/SNYK-JS-DOMITERATOR-6157199 - () https://security.snyk.io/vuln/SNYK-JS-DOMITERATOR-6157199 - Exploit, Third Party Advisory
First Time Matthewmueller
Matthewmueller dom-iterator

13 Nov 2024, 17:01

Type Values Removed Values Added
Summary
  • (es) Todas las versiones del paquete dom-iterator son vulnerables a la ejecución de código arbitrario debido al uso del constructor Function sin una desinfección completa de la entrada. Function genera un nuevo cuerpo de función y, por lo tanto, se debe tener cuidado para garantizar que las entradas a Function no estén controladas por un atacante. Los riesgos involucrados son similares a los de permitir que la entrada controlada por un atacante llegue a eval.

13 Nov 2024, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-13 05:15

Updated : 2024-11-19 16:20


NVD link : CVE-2024-21541

Mitre link : CVE-2024-21541

CVE.ORG link : CVE-2024-21541


JSON object : View

Products Affected

matthewmueller

  • dom-iterator
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')