cve/2024/CVE-2024-21541.md
2025-09-29 16:08:36 +00:00

21 lines
1.1 KiB
Markdown

### [CVE-2024-21541](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21541)
![](https://img.shields.io/static/v1?label=Product&message=dom-iterator&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=org.webjars.npm%3Adom-iterator&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%20*%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%201.0.1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Arbitrary%20Code%20Execution&color=brighgreen)
### Description
Versions of the package dom-iterator before 1.0.1 are vulnerable to Arbitrary Code Execution due to use of the Function constructor without complete input sanitization. Function generates a new function body and thus care must be given to ensure that the inputs to Function are not attacker-controlled. The risks involved are similar to that of allowing attacker-controlled input to reach eval.
### POC
#### Reference
- https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-8383166
- https://security.snyk.io/vuln/SNYK-JS-DOMITERATOR-6157199
#### Github
No PoCs found on GitHub currently.