Description
fsevents before 1.2.11 depends on the https://fsevents-binaries.s3-us-west-2.amazonaws.com URL, which might allow an adversary to execute arbitrary code if any JavaScript project (that depends on fsevents) distributes code that was obtained from that URL at a time when it was controlled by an adversary. NOTE: some sources feel that this means that no version is affected any longer, because the URL is not controlled by an adversary.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2701 | fsevents before 1.2.11 depends on the https://fsevents-binaries.s3-us-west-2.amazonaws.com URL, which might allow an adversary to execute arbitrary code if any JavaScript project (that depends on fsevents) distributes code that was obtained from that URL at a time when it was controlled by an adversary. NOTE: some sources feel that this means that no version is affected any longer, because the URL is not controlled by an adversary. |
Github GHSA |
GHSA-8r6j-v8pm-fqw3 | Code injection in fsevents |
References
History
Tue, 26 Nov 2024 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-11-26T21:45:11.260Z
Reserved: 2023-10-06T00:00:00.000Z
Link: CVE-2023-45311
Updated: 2024-08-02T20:21:15.380Z
Status : Modified
Published: 2023-10-06T21:15:10.940
Modified: 2024-11-21T08:26:43.370
Link: CVE-2023-45311
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA