There is a vulnerability in Paginator (Elixir/Hex package) which makes it susceptible to Remote Code Execution (RCE) attacks via input parameters to the paginate() function. This will potentially affect all current users of Paginator prior to version 1.0.0. The vulnerability has been patched in version 1.0.0 and all users should upgrade to this version immediately. Note that this patched version uses a dependency that requires an Elixir version >=1.5.
References
Link | Resource |
---|---|
https://github.com/duffelhq/paginator/commit/bf45e92602e517c75aea0465efc35cd661d9ebf8 | Patch Third Party Advisory |
https://github.com/duffelhq/paginator/security/advisories/GHSA-w98m-2xqg-9cvj | Third Party Advisory |
https://github.com/duffelhq/paginator/blob/ccf0f37fa96347cc8c8a7e9eb2c64462cec4b2dc/README.md#security-considerations | Third Party Advisory |
https://hex.pm/packages/paginator | Product |
Configurations
Information
Published : 2020-09-01 10:15
Updated : 2020-09-11 07:34
NVD link : CVE-2020-15150
Mitre link : CVE-2020-15150
JSON object : View
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
Products Affected
duffel
- paginator