The package underscore from 1.13.0-0 and before 1.13.0-2, from 1.3.2 and before 1.12.1 are vulnerable to Arbitrary Code Injection via the template function, particularly when a variable property is passed as an argument as it is not sanitized.
References
Link Providers
https://github.com/jashkenas/underscore/blob/master/modules/template.js%23L71 cve-icon cve-icon
https://lists.apache.org/thread.html/r5df90c46f7000c4aab246e947f62361ecfb849c5a553dcdb0ef545e1%40%3Cissues.cordova.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r770f910653772317b117ab4472b0a32c266ee4abbafda28b8a6f9306%40%3Cissues.cordova.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/raae088abdfa4fbd84e1d19d7a7ffe52bf8e426b83e6599ea9a734dba%40%3Cissues.cordova.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rbc84926bacd377503a3f5c37b923c1931f9d343754488d94e6f08039%40%3Cissues.cordova.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/re69ee408b3983b43e9c4a82a9a17cbbf8681bb91a4b61b46f365aeaf%40%3Cissues.cordova.apache.org%3E cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2021/03/msg00038.html cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EOKATXXETD2PF3OR36Q5PD2VSVAR6J5Z/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FGEE7U4Z655A2MK5EW4UQQZ7B64XJWBV/ cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2021-23358 cve-icon
https://security.netapp.com/advisory/ntap-20240808-0003/ cve-icon
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1081504 cve-icon cve-icon
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBJASHKENAS-1081505 cve-icon cve-icon
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1081503 cve-icon cve-icon
https://snyk.io/vuln/SNYK-JS-UNDERSCORE-1080984 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2021-23358 cve-icon
https://www.debian.org/security/2021/dsa-4883 cve-icon cve-icon
https://www.tenable.com/security/tns-2021-14 cve-icon cve-icon
History

Fri, 22 Nov 2024 12:00:00 +0000

Type Values Removed Values Added
References

Wed, 18 Sep 2024 21:30:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sun, 08 Sep 2024 18:30:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:acm:2.2::el7

Thu, 29 Aug 2024 20:30:00 +0000

Type Values Removed Values Added
References

Mon, 19 Aug 2024 22:15:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:acm:2.2::el7
cpe:/a:redhat:acm:2.2::el8

cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published: 2021-03-29T13:15:34.770665Z

Updated: 2024-09-17T03:47:56.577Z

Reserved: 2021-01-08T00:00:00

Link: CVE-2021-23358

cve-icon Vulnrichment

Updated: 2024-08-08T13:05:14.728Z

cve-icon NVD

Status : Modified

Published: 2021-03-29T14:15:18.047

Modified: 2024-11-21T05:51:34.207

Link: CVE-2021-23358

cve-icon Redhat

Severity : Important

Publid Date: 2021-03-29T00:00:00Z

Links: CVE-2021-23358 - Bugzilla