All versions of the package jsonpath-plus are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of vm in Node. **Note:** There were several attempts to fix it in versions [10.0.0-10.1.0](https://github.com/JSONPath-Plus/JSONPath/compare/v9.0.0...v10.1.0) but it could still be exploited using [different payloads](https://github.com/JSONPath-Plus/JSONPath/issues/226).
History

Wed, 27 Nov 2024 02:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat
Redhat openshift Devspaces
CPEs cpe:/a:redhat:openshift_devspaces:3::el8
Vendors & Products Redhat
Redhat openshift Devspaces

Mon, 18 Nov 2024 11:30:00 +0000


Mon, 18 Nov 2024 10:45:00 +0000

Type Values Removed Values Added
Description Versions of the package jsonpath-plus before 10.0.7 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of vm in Node. **Note:** There was an attempt to fix it in version [10.0.0](https://github.com/JSONPath-Plus/JSONPath/commit/6b2f1b4c234292c75912b790bf7e2d7339d4ccd3) but it could still be exploited using [different payloads](https://github.com/JSONPath-Plus/JSONPath/issues/226). All versions of the package jsonpath-plus are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of vm in Node. **Note:** There were several attempts to fix it in versions [10.0.0-10.1.0](https://github.com/JSONPath-Plus/JSONPath/compare/v9.0.0...v10.1.0) but it could still be exploited using [different payloads](https://github.com/JSONPath-Plus/JSONPath/issues/226).
References

Sun, 20 Oct 2024 12:00:00 +0000

Type Values Removed Values Added
Description Versions of the package jsonpath-plus before 10.0.0 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of vm in Node. **Note:** The unsafe behavior is still available after applying the fix but it is not turned on by default. Versions of the package jsonpath-plus before 10.0.7 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of vm in Node. **Note:** There was an attempt to fix it in version [10.0.0](https://github.com/JSONPath-Plus/JSONPath/commit/6b2f1b4c234292c75912b790bf7e2d7339d4ccd3) but it could still be exploited using [different payloads](https://github.com/JSONPath-Plus/JSONPath/issues/226).
References

Wed, 16 Oct 2024 09:00:00 +0000

Type Values Removed Values Added
References

Fri, 11 Oct 2024 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Jsonpath-plus
Jsonpath-plus jsonpath
CPEs cpe:2.3:a:jsonpath-plus:jsonpath:*:*:*:*:*:*:*:*
Vendors & Products Jsonpath-plus
Jsonpath-plus jsonpath
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 11 Oct 2024 13:30:00 +0000

Type Values Removed Values Added
Title jsonpath-plus: Remote Code Execution in jsonpath-plus via Improper Input Sanitization
References
Metrics threat_severity

None

threat_severity

Critical


Fri, 11 Oct 2024 05:15:00 +0000

Type Values Removed Values Added
Description Versions of the package jsonpath-plus before 10.0.0 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of vm in Node. **Note:** The unsafe behavior is still available after applying the fix but it is not turned on by default.
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published: 2024-10-11T05:00:01.824Z

Updated: 2024-11-18T10:37:45.634Z

Reserved: 2023-12-22T12:33:20.123Z

Link: CVE-2024-21534

cve-icon Vulnrichment

Updated: 2024-10-11T14:48:12.431Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-10-11T13:15:15.667

Modified: 2024-11-18T11:15:06.447

Link: CVE-2024-21534

cve-icon Redhat

Severity : Critical

Publid Date: 2024-10-11T05:00:01Z

Links: CVE-2024-21534 - Bugzilla