logo

CVE-2020-7697 mock2easy

Package

Manager: npm
Name: mock2easy
Vulnerable Version: >=0 <=0.0.24

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00421 pctl0.6119

Details

Code injection in mock2easy This affects all versions up to and including version 0.0.24 of package mock2easy. a malicious user could inject commands through the `_data` variable: Affected Area ```js require('../server/getJsonByCurl')(mock2easy, function(error, stdout) { if (error) { return res.json(500, error); } res.json(JSON.parse(stdout)); }, '', _data.interfaceUrl, query, _data.cookie, _data.interfaceType);```

Metadata

Created: 2021-05-06T18:25:58Z
Modified: 2023-09-08T19:29:12Z
Source: MANUAL
CWE IDs: ["CWE-77"]
Alternative ID: GHSA-g4xj-wcq6-qwx5
Finding: F422
Auto approve: 1