CVE-2022-25760 – accesslog
Package
Manager: npm
Name: accesslog
Vulnerable Version: >=0 <=0.0.2
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N
EPSS: 0.00436 pctl0.62121
Details
Code injection in accesslog All versions of package accesslog are vulnerable to Arbitrary Code Injection due to the usage of the Function constructor without input sanitization. If (attacker-controlled) user input is given to the format option of the package's exported constructor function, it is possible for an attacker to execute arbitrary JavaScript code on the host that this package is being run on.
Metadata
Created: 2022-03-18T00:01:10Z
Modified: 2022-03-18T22:41:34Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/03/GHSA-8m2f-74r2-x3f2/GHSA-8m2f-74r2-x3f2.json
CWE IDs: ["CWE-94"]
Alternative ID: GHSA-8m2f-74r2-x3f2
Finding: F422
Auto approve: 1