CVE-2024-21541

Versions of the package dom-iterator before 1.0.1 are vulnerable to Arbitrary Code Execution due to use of the Function constructor without complete input sanitization. Function generates a new function body and thus care must be given to ensure that the inputs to Function are not attacker-controlled. The risks involved are similar to that of allowing attacker-controlled input to reach eval.
Configurations

Configuration 1 (hide)

cpe:2.3:a:matthewmueller:dom-iterator:*:*:*:*:*:node.js:*:*

History

14 Jan 2025, 17:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 9.8
v2 : unknown
v3 : 7.3
Summary (en) All versions of the package dom-iterator are vulnerable to Arbitrary Code Execution due to use of the Function constructor without complete input sanitization. Function generates a new function body and thus care must be given to ensure that the inputs to Function are not attacker-controlled. The risks involved are similar to that of allowing attacker-controlled input to reach eval. (en) Versions of the package dom-iterator before 1.0.1 are vulnerable to Arbitrary Code Execution due to use of the Function constructor without complete input sanitization. Function generates a new function body and thus care must be given to ensure that the inputs to Function are not attacker-controlled. The risks involved are similar to that of allowing attacker-controlled input to reach eval.
References
  • () https://github.com/matthewmueller/dom-iterator/commit/9e0e0fad5a251de5b42feb326c4204eb04080805 -
  • () https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-8383166 -

19 Nov 2024, 16:20

Type Values Removed Values Added
References () https://security.snyk.io/vuln/SNYK-JS-DOMITERATOR-6157199 - () https://security.snyk.io/vuln/SNYK-JS-DOMITERATOR-6157199 - Exploit, Third Party Advisory
CVSS v2 : unknown
v3 : 7.3
v2 : unknown
v3 : 9.8
First Time Matthewmueller dom-iterator
Matthewmueller
CPE cpe:2.3:a:matthewmueller:dom-iterator:*:*:*:*:*:node.js:*:*

13 Nov 2024, 17:01

Type Values Removed Values Added
Summary
  • (es) Todas las versiones del paquete dom-iterator son vulnerables a la ejecución de código arbitrario debido al uso del constructor Function sin una desinfección completa de la entrada. Function genera un nuevo cuerpo de función y, por lo tanto, se debe tener cuidado para garantizar que las entradas a Function no estén controladas por un atacante. Los riesgos involucrados son similares a los de permitir que la entrada controlada por un atacante llegue a eval.

13 Nov 2024, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-13 05:15

Updated : 2025-01-14 17:15


NVD link : CVE-2024-21541

Mitre link : CVE-2024-21541

CVE.ORG link : CVE-2024-21541


JSON object : View

Products Affected

matthewmueller

  • dom-iterator
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')