Description
Medis version 0.6.1 and earlier contains a XSS vulnerability evolving into code execution due to enabled nodeIntegration for the renderer process vulnerability in Key name parameter on new key creation that can result in Unauthorized code execution in the victim's machine, within the rights of the running application. This attack appear to be exploitable via Victim is synchronizing data from the redis server which contains malicious key value.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-1927 | Medis version 0.6.1 and earlier contains a XSS vulnerability evolving into code execution due to enabled nodeIntegration for the renderer process vulnerability in Key name parameter on new key creation that can result in Unauthorized code execution in the victim's machine, within the rights of the running application. This attack appear to be exploitable via Victim is synchronizing data from the redis server which contains malicious key value. |
References
| Link | Providers |
|---|---|
| https://github.com/luin/medis/issues/109 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T12:40:47.190Z
Reserved: 2018-05-11T00:00:00.000Z
Link: CVE-2018-1000536
No data.
Status : Modified
Published: 2018-06-26T16:29:02.040
Modified: 2024-11-21T03:40:08.810
Link: CVE-2018-1000536
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD