Eval injection vulnerability in the internals.batch function in lib/batch.js in the bassmaster plugin before 1.5.2 for the hapi server framework for Node.js allows remote attackers to execute arbitrary Javascript code via unspecified vectors.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2014/09/30/10 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/70180 | Third Party Advisory VDB Entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/96730 | Third Party Advisory VDB Entry |
https://github.com/hapijs/bassmaster/commit/b751602d8cb7194ee62a61e085069679525138c4 | Exploit |
https://nodesecurity.io/advisories/bassmaster_js_injection | Third Party Advisory |
https://www.exploit-db.com/exploits/40689/ | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2014-10-08 17:55
Updated : 2024-02-04 18:35
NVD link : CVE-2014-7205
Mitre link : CVE-2014-7205
CVE.ORG link : CVE-2014-7205
JSON object : View
Products Affected
bassmaster_project
- bassmaster
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')