@blakeembrey/template is a string template library. Prior to version 1.2.0, it is possible to inject and run code within the template if the attacker has access to write the template name. Version 1.2.0 contains a patch. As a workaround, don't pass untrusted input as the template display name, or don't use the display name feature.
References
Configurations
History
12 Sep 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
References | () https://github.com/blakeembrey/js-template/commit/b8d9aa999e464816c6cfb14acd1ad0f5d1e335aa - Patch | |
References | () https://github.com/blakeembrey/js-template/security/advisories/GHSA-q765-wm9j-66qj - Vendor Advisory | |
First Time |
Blakeembrey template
Blakeembrey |
|
CPE | cpe:2.3:a:blakeembrey:template:*:*:*:*:*:node.js:*:* |
04 Sep 2024, 13:05
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
03 Sep 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-03 20:15
Updated : 2024-09-12 20:15
NVD link : CVE-2024-45390
Mitre link : CVE-2024-45390
CVE.ORG link : CVE-2024-45390
JSON object : View
Products Affected
blakeembrey
- template
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')