CVE-2021-32819 – squirrelly
Package
Manager: npm
Name: squirrelly
Vulnerable Version: >=0 <9.0.0
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N
EPSS: 0.89972 pctl0.99558
Details
Insecure template handling in Squirrelly Squirrelly is a template engine implemented in JavaScript that works out of the box with ExpressJS. Squirrelly mixes pure template data with engine configuration options through the Express render API. By overwriting internal configuration options remote code execution may be triggered in downstream applications. Version 9.0.0 has a fix for this issue. For complete details refer to the referenced [GHSL-2021-023](https://securitylab.github.com/advisories/GHSL-2021-023-squirrelly/).
Metadata
Created: 2021-05-17T20:58:02Z
Modified: 2023-09-11T16:25:10Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/05/GHSA-q8j6-pwqx-pm96/GHSA-q8j6-pwqx-pm96.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-q8j6-pwqx-pm96
Finding: F017
Auto approve: 1