An issue was discovered in the serialize-to-js package 0.5.0 for Node.js. Untrusted data passed into the deserialize() function can be exploited to achieve arbitrary code execution by passing a JavaScript Object with an Immediately Invoked Function Expression (IIFE).
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-0297 | An issue was discovered in the serialize-to-js package 0.5.0 for Node.js. Untrusted data passed into the deserialize() function can be exploited to achieve arbitrary code execution by passing a JavaScript Object with an Immediately Invoked Function Expression (IIFE). |
Github GHSA |
GHSA-mm62-wxc8-cf7m | Code Execution Through IIFE in serialize-to-js |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T15:18:48.874Z
Reserved: 2017-02-10T00:00:00
Link: CVE-2017-5954
No data.
Status : Deferred
Published: 2017-02-10T07:59:00.310
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-5954
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA