CVE-2022-25967 – eta
Package
Manager: npm
Name: eta
Vulnerable Version: >=0 <2.0.0
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.05024 pctl0.89323
Details
Eta vulnerable to Code Injection via templates rendered with user-defined data Versions of the package eta before 2.0.0 are vulnerable to Remote Code Execution (RCE) by overwriting template engine configuration variables with view options received from The Express render API. **Note:** This is exploitable only for users who are rendering templates with user-defined data.
Metadata
Created: 2023-01-30T06:30:27Z
Modified: 2023-02-07T23:18:23Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/01/GHSA-mf6x-hrgr-658f/GHSA-mf6x-hrgr-658f.json
CWE IDs: ["CWE-94"]
Alternative ID: GHSA-mf6x-hrgr-658f
Finding: F422
Auto approve: 1