2024-12-08 03:06:42 +00:00

125 lines
3.6 KiB
JSON

{
"id": "CVE-2020-7678",
"sourceIdentifier": "report@snyk.io",
"published": "2022-07-25T14:15:10.100",
"lastModified": "2024-11-21T05:37:35.750",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This affects all versions of package node-import. The \"params\" argument of module function can be controlled by users without any sanitization.b. This is then provided to the \u201ceval\u201d function located in line 79 in the index file \"index.js\"."
},
{
"lang": "es",
"value": "Esto afecta a todas las versiones del paquete node-import. El argumento \"params\" de la funci\u00f3n del m\u00f3dulo puede ser controlado por usuarios sin ning\u00fan tipo de saneo.b. Esto es luego proporcionado a la funci\u00f3n \"eval\" ubicada en la l\u00ednea 79 en el archivo index \"index.js\""
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "report@snyk.io",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 4.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:node-import_project:node-import:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "1A49E0B5-20B2-4588-9BFD-0D44F4F8799F"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/mahdaen/node-import/blob/master/index.js%23L79",
"source": "report@snyk.io",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
{
"url": "https://security.snyk.io/vuln/SNYK-JS-NODEIMPORT-571691",
"source": "report@snyk.io",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/mahdaen/node-import/blob/master/index.js%23L79",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
{
"url": "https://security.snyk.io/vuln/SNYK-JS-NODEIMPORT-571691",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}