Versions of the package eta before 2.0.0 are vulnerable to Remote Code Execution (RCE) by overwriting template engine configuration variables with view options received from The Express render API. **Note:** This is exploitable only for users who are rendering templates with user-defined data.
References
Link | Resource |
---|---|
https://github.com/eta-dev/eta/blob/9c8e4263d3a559444a3881a85c1607bf344d0b28/src/compile-string.ts%23L21 | Broken Link |
https://github.com/eta-dev/eta/blob/9c8e4263d3a559444a3881a85c1607bf344d0b28/src/file-handlers.ts%23L182 | Broken Link |
https://github.com/eta-dev/eta/commit/5651392462ee0ff19d77c8481081a99e5b9138dd | Patch Third Party Advisory |
https://security.snyk.io/vuln/SNYK-JS-ETA-2936803 | Third Party Advisory |
Configurations
Information
Published : 2023-01-29 21:15
Updated : 2023-02-07 11:13
NVD link : CVE-2022-25967
Mitre link : CVE-2022-25967
JSON object : View
CWE
Products Affected
eta.js
- eta