Metrics
Affected Vendors & Products
Wed, 27 Nov 2024 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat openshift Devspaces |
|
CPEs | cpe:/a:redhat:openshift_devspaces:3::el8 | |
Vendors & Products |
Redhat
Redhat openshift Devspaces |
Mon, 18 Nov 2024 11:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Mon, 18 Nov 2024 10:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Versions of the package jsonpath-plus before 10.0.7 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of vm in Node. **Note:** There was an attempt to fix it in version [10.0.0](https://github.com/JSONPath-Plus/JSONPath/commit/6b2f1b4c234292c75912b790bf7e2d7339d4ccd3) but it could still be exploited using [different payloads](https://github.com/JSONPath-Plus/JSONPath/issues/226). | All versions of the package jsonpath-plus are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of vm in Node. **Note:** There were several attempts to fix it in versions [10.0.0-10.1.0](https://github.com/JSONPath-Plus/JSONPath/compare/v9.0.0...v10.1.0) but it could still be exploited using [different payloads](https://github.com/JSONPath-Plus/JSONPath/issues/226). |
References |
|
Sun, 20 Oct 2024 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Versions of the package jsonpath-plus before 10.0.0 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of vm in Node. **Note:** The unsafe behavior is still available after applying the fix but it is not turned on by default. | Versions of the package jsonpath-plus before 10.0.7 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of vm in Node. **Note:** There was an attempt to fix it in version [10.0.0](https://github.com/JSONPath-Plus/JSONPath/commit/6b2f1b4c234292c75912b790bf7e2d7339d4ccd3) but it could still be exploited using [different payloads](https://github.com/JSONPath-Plus/JSONPath/issues/226). |
References |
|
Wed, 16 Oct 2024 09:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Fri, 11 Oct 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Jsonpath-plus
Jsonpath-plus jsonpath |
|
CPEs | cpe:2.3:a:jsonpath-plus:jsonpath:*:*:*:*:*:*:*:* | |
Vendors & Products |
Jsonpath-plus
Jsonpath-plus jsonpath |
|
Metrics |
ssvc
|
Fri, 11 Oct 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | jsonpath-plus: Remote Code Execution in jsonpath-plus via Improper Input Sanitization | |
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Fri, 11 Oct 2024 05:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Versions of the package jsonpath-plus before 10.0.0 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of vm in Node. **Note:** The unsafe behavior is still available after applying the fix but it is not turned on by default. | |
Weaknesses | CWE-94 | |
References |
| |
Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: snyk
Published: 2024-10-11T05:00:01.824Z
Updated: 2024-11-18T10:37:45.634Z
Reserved: 2023-12-22T12:33:20.123Z
Link: CVE-2024-21534
Updated: 2024-10-11T14:48:12.431Z
Status : Awaiting Analysis
Published: 2024-10-11T13:15:15.667
Modified: 2024-11-18T11:15:06.447
Link: CVE-2024-21534