FeHelper through 2019-06-19 allows arbitrary code execution during a JSON format operation, as demonstrated by the {"a":(function(){confirm(1)})()} input.
References
Link | Resource |
---|---|
https://github.com/zxlie/FeHelper/issues/63 | Exploit Issue Tracking Third Party Advisory |
Configurations
Information
Published : 2019-06-26 05:15
Updated : 2020-08-24 10:37
NVD link : CVE-2019-12966
Mitre link : CVE-2019-12966
JSON object : View
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Products Affected
fehelper_project
- fehelper