CVE-2018-6333 – nuclide
Package
Manager: npm
Name: nuclide
Vulnerable Version: >=0 <0.290.0
Severity
Level: Critical
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.01115 pctl0.77291
Details
Nuclide Improper Input Validation The hhvm-attach deep link handler in Nuclide did not properly sanitize the provided hostname parameter when rendering. As a result, a malicious URL could be used to render HTML and other content inside of the editor's context, which could potentially be chained to lead to code execution. This issue affected Nuclide prior to v0.290.0.
Metadata
Created: 2022-05-13T01:32:03Z
Modified: 2023-07-21T23:24:45Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-r83x-wj75-v89r/GHSA-r83x-wj75-v89r.json
CWE IDs: ["CWE-20", "CWE-79"]
Alternative ID: GHSA-r83x-wj75-v89r
Finding: F184
Auto approve: 1