CVE-2020-6836 – hot-formula-parser
Package
Manager: npm
Name: hot-formula-parser
Vulnerable Version: >=0 <3.0.1
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00957 pctl0.75545
Details
Command Injection in hot-formula-parser Versions of `hot-formula-parser` prior to 3.0.1 are vulnerable to Command Injection. The package fails to sanitize values passed to the `parse` function and concatenates it in an `eval` call. If a value of the formula is supplied by user-controlled input it may allow attackers to run arbitrary commands in the server. Parsing the following formula creates a `test` file in the present directory: `"SUM([(function(){require('child_process').execSync('touch test')})(),2])"` ## Recommendation Upgrade to version 3.0.1 or later.
Metadata
Created: 2020-05-06T19:32:33Z
Modified: 2021-08-25T21:04:44Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/05/GHSA-rc77-xxq6-4mff/GHSA-rc77-xxq6-4mff.json
CWE IDs: ["CWE-94"]
Alternative ID: GHSA-rc77-xxq6-4mff
Finding: F422
Auto approve: 1