This affects all versions of package jsen. If an attacker can control the schema file, it could run arbitrary JavaScript code on the victim machine. In the module description and README file there is no mention about the risks of untrusted schema files, so I assume that this is applicable. In particular the required field of the schema is not properly sanitized. The resulting string that is build based on the schema definition is then passed to a Function.apply();, leading to an Arbitrary Code Execution.
References
Link | Resource |
---|---|
https://github.com/bugventure/jsen/blob/master/lib/jsen.js%23L875 | Broken Link |
https://snyk.io/vuln/SNYK-JS-JSEN-1014670 | Exploit Third Party Advisory |
https://github.com/bugventure/jsen/blob/master/lib/jsen.js%23L875 | Broken Link |
https://snyk.io/vuln/SNYK-JS-JSEN-1014670 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:37
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/bugventure/jsen/blob/master/lib/jsen.js%23L875 - Broken Link | |
References | () https://snyk.io/vuln/SNYK-JS-JSEN-1014670 - Exploit, Third Party Advisory |
Information
Published : 2020-11-23 16:15
Updated : 2024-11-21 05:37
NVD link : CVE-2020-7777
Mitre link : CVE-2020-7777
CVE.ORG link : CVE-2020-7777
JSON object : View
Products Affected
jsen_project
- jsen
CWE