Description
The dot package v1.1.2 uses Function() to compile templates. This can be exploited by the attacker if they can control the given template or if they can control the value set on Object.prototype.
Published: 2020-03-15
Score: 8.8 High
EPSS: 1.0% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-1949 The dot package v1.1.2 uses Function() to compile templates. This can be exploited by the attacker if they can control the given template or if they can control the value set on Object.prototype.
Github GHSA Github GHSA GHSA-297x-8xj4-vcxv Improper Control of Generation of Code in doT
References
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: hackerone

Published:

Updated: 2024-08-04T09:48:25.637Z

Reserved: 2020-01-28T00:00:00.000Z

Link: CVE-2020-8141

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-03-15T18:15:11.287

Modified: 2024-11-21T05:38:22.380

Link: CVE-2020-8141

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses