CVE-2024-36361

Pug through 3.0.2 allows JavaScript code execution if an application accepts untrusted input for the name option of the compileClient, compileFileClient, or compileClientWithDependenciesTracked function. NOTE: these functions are for compiling Pug templates into JavaScript, and there would typically be no reason to allow untrusted callers.
Configurations

No configuration.

History

21 Nov 2024, 09:22

Type Values Removed Values Added
References () https://github.com/pugjs/pug/pull/3428 - () https://github.com/pugjs/pug/pull/3428 -
References () https://pugjs.org/api/reference.html - () https://pugjs.org/api/reference.html -

03 Jul 2024, 02:03

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.8
CWE CWE-94

06 Jun 2024, 16:15

Type Values Removed Values Added
Summary
  • (es) Pug hasta 3.0.2 permite la ejecución de código JavaScript si una aplicación acepta entradas que no son de confianza para la opción de nombre de la función compileClient, compileFileClient o compileClientWithDependenciesTracked. NOTA: estas funciones son para compilar plantillas de Pug en JavaScript y normalmente no habría motivo para permitir llamadas que no sean de confianza.

24 May 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-24 06:15

Updated : 2024-11-21 09:22


NVD link : CVE-2024-36361

Mitre link : CVE-2024-36361

CVE.ORG link : CVE-2024-36361


JSON object : View

Products Affected

No product.

CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')