← Zuruck zu CVEs
CVE-2024-21534
CRITICAL9.8
Beschreibung
All versions of the package jsonpath-plus are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of vm in Node. **Note:** There were several attempts to fix it in versions [10.0.0-10.1.0](https://github.com/JSONPath-Plus/JSONPath/compare/v9.0.0...v10.1.0) but it could still be exploited using [different payloads](https://github.com/JSONPath-Plus/JSONPath/issues/226).
CVE Details
CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht10/11/2024
Zuletzt geandert11/18/2024
Quellenvd
Honeypot-Sichtungen0
Schwachen (CWE)
CWE-94CWE-94
Referenzen
https://github.com/JSONPath-Plus/JSONPath/issues/226(report@snyk.io)
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-8185019(report@snyk.io)
https://security.snyk.io/vuln/SNYK-JS-JSONPATHPLUS-7945884(report@snyk.io)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.