CVE-2022-25760

All versions of package accesslog are vulnerable to Arbitrary Code Injection due to the usage of the Function constructor without input sanitization. If (attacker-controlled) user input is given to the format option of the package's exported constructor function, it is possible for an attacker to execute arbitrary JavaScript code on the host that this package is being run on.
Configurations

Configuration 1 (hide)

cpe:2.3:a:accesslog_project:accesslog:*:*:*:*:*:*:*:*

History

23 Mar 2022, 18:40

Type Values Removed Values Added
References (MISC) https://snyk.io/vuln/SNYK-JS-ACCESSLOG-2312099 - (MISC) https://snyk.io/vuln/SNYK-JS-ACCESSLOG-2312099 - Exploit, Third Party Advisory
References (MISC) https://github.com/carlos8f/node-accesslog/blob/master/lib/compile.js%23L6 - (MISC) https://github.com/carlos8f/node-accesslog/blob/master/lib/compile.js%23L6 - Broken Link
CWE CWE-94
CVSS v2 : unknown
v3 : unknown
v2 : 10.0
v3 : 9.8
CPE cpe:2.3:a:accesslog_project:accesslog:*:*:*:*:*:*:*:*

17 Mar 2022, 12:50

Type Values Removed Values Added
New CVE

Information

Published : 2022-03-17 12:15

Updated : 2024-02-04 22:29


NVD link : CVE-2022-25760

Mitre link : CVE-2022-25760

CVE.ORG link : CVE-2022-25760


JSON object : View

Products Affected

accesslog_project

  • accesslog
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')