Versions of the package dom-iterator before 1.0.1 are vulnerable to Arbitrary Code Execution due to use of the Function constructor without complete input sanitization. Function generates a new function body and thus care must be given to ensure that the inputs to Function are not attacker-controlled. The risks involved are similar to that of allowing attacker-controlled input to reach eval.
History

Tue, 14 Jan 2025 17:00:00 +0000

Type Values Removed Values Added
Description All versions of the package dom-iterator are vulnerable to Arbitrary Code Execution due to use of the Function constructor without complete input sanitization. Function generates a new function body and thus care must be given to ensure that the inputs to Function are not attacker-controlled. The risks involved are similar to that of allowing attacker-controlled input to reach eval. Versions of the package dom-iterator before 1.0.1 are vulnerable to Arbitrary Code Execution due to use of the Function constructor without complete input sanitization. Function generates a new function body and thus care must be given to ensure that the inputs to Function are not attacker-controlled. The risks involved are similar to that of allowing attacker-controlled input to reach eval.
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Tue, 19 Nov 2024 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Matthewmueller
Matthewmueller dom-iterator
CPEs cpe:2.3:a:matthewmueller:dom-iterator:*:*:*:*:*:node.js:*:*
Vendors & Products Matthewmueller
Matthewmueller dom-iterator

Thu, 14 Nov 2024 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Dom-iterator
Dom-iterator dom-iterator
CPEs cpe:2.3:a:dom-iterator:dom-iterator:*:*:*:*:*:*:*:*
Vendors & Products Dom-iterator
Dom-iterator dom-iterator
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 13 Nov 2024 05:15:00 +0000

Type Values Removed Values Added
Description All versions of the package dom-iterator are vulnerable to Arbitrary Code Execution due to use of the Function constructor without complete input sanitization. Function generates a new function body and thus care must be given to ensure that the inputs to Function are not attacker-controlled. The risks involved are similar to that of allowing attacker-controlled input to reach eval.
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published: 2024-11-13T05:00:12.270Z

Updated: 2025-01-14T16:53:39.641Z

Reserved: 2023-12-22T12:33:20.123Z

Link: CVE-2024-21541

cve-icon Vulnrichment

Updated: 2024-11-14T16:04:20.796Z

cve-icon NVD

Status : Modified

Published: 2024-11-13T05:15:14.680

Modified: 2025-01-14T17:15:16.573

Link: CVE-2024-21541

cve-icon Redhat

No data.