logo

CVE-2018-6333 nuclide

Package

Manager: npm
Name: nuclide
Vulnerable Version: >=0 <0.290.0

Severity

Level: Critical

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.01115 pctl0.77291

Details

Nuclide Improper Input Validation The hhvm-attach deep link handler in Nuclide did not properly sanitize the provided hostname parameter when rendering. As a result, a malicious URL could be used to render HTML and other content inside of the editor's context, which could potentially be chained to lead to code execution. This issue affected Nuclide prior to v0.290.0.

Metadata

Created: 2022-05-13T01:32:03Z
Modified: 2023-07-21T23:24:45Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-r83x-wj75-v89r/GHSA-r83x-wj75-v89r.json
CWE IDs: ["CWE-20", "CWE-79"]
Alternative ID: GHSA-r83x-wj75-v89r
Finding: F184
Auto approve: 1