mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-30 18:56:19 +00:00
1.4 KiB
1.4 KiB
CVE-2025-1302
Description
Versions of the package jsonpath-plus before 10.3.0 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of eval='safe' mode.
Note:
This is caused by an incomplete fix for CVE-2024-21534.
POC
Reference
- https://gist.github.com/nickcopi/11ba3cb4fdee6f89e02e6afae8db6456
- https://security.snyk.io/vuln/SNYK-JS-JSONPATHPLUS-8719585
Github
- https://github.com/0xMarcio/cve
- https://github.com/EQSTLab/CVE-2025-1302
- https://github.com/GhostTroops/TOP
- https://github.com/Jaenact/2025_OSSCA_challenge
- https://github.com/a1batr0ssG/VulhubExpand
- https://github.com/abrewer251/CVE-2025-1302_jsonpath-plus_RCE
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/plzheheplztrying/cve_monitor
- https://github.com/tanjiti/sec_profile
- https://github.com/vladko312/SSTImap
- https://github.com/vladko312/extras
- https://github.com/yembors64632/cve_monitor_Public