logo

CVE-2022-25967 eta

Package

Manager: npm
Name: eta
Vulnerable Version: >=0 <2.0.0

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.05024 pctl0.89323

Details

Eta vulnerable to Code Injection via templates rendered with user-defined data Versions of the package eta before 2.0.0 are vulnerable to Remote Code Execution (RCE) by overwriting template engine configuration variables with view options received from The Express render API. **Note:** This is exploitable only for users who are rendering templates with user-defined data.

Metadata

Created: 2023-01-30T06:30:27Z
Modified: 2023-02-07T23:18:23Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/01/GHSA-mf6x-hrgr-658f/GHSA-mf6x-hrgr-658f.json
CWE IDs: ["CWE-94"]
Alternative ID: GHSA-mf6x-hrgr-658f
Finding: F422
Auto approve: 1