Versions of the package dom-iterator before 1.0.1 are vulnerable to Arbitrary Code Execution due to use of the Function constructor without complete input sanitization. Function generates a new function body and thus care must be given to ensure that the inputs to Function are not attacker-controlled. The risks involved are similar to that of allowing attacker-controlled input to reach eval.
Metrics
Affected Vendors & Products
References
History
Tue, 14 Jan 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | All versions of the package dom-iterator are vulnerable to Arbitrary Code Execution due to use of the Function constructor without complete input sanitization. Function generates a new function body and thus care must be given to ensure that the inputs to Function are not attacker-controlled. The risks involved are similar to that of allowing attacker-controlled input to reach eval. | Versions of the package dom-iterator before 1.0.1 are vulnerable to Arbitrary Code Execution due to use of the Function constructor without complete input sanitization. Function generates a new function body and thus care must be given to ensure that the inputs to Function are not attacker-controlled. The risks involved are similar to that of allowing attacker-controlled input to reach eval. |
References |
| |
Metrics |
cvssV4_0
|
Tue, 19 Nov 2024 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Matthewmueller
Matthewmueller dom-iterator |
|
CPEs | cpe:2.3:a:matthewmueller:dom-iterator:*:*:*:*:*:node.js:*:* | |
Vendors & Products |
Matthewmueller
Matthewmueller dom-iterator |
Thu, 14 Nov 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Dom-iterator
Dom-iterator dom-iterator |
|
CPEs | cpe:2.3:a:dom-iterator:dom-iterator:*:*:*:*:*:*:*:* | |
Vendors & Products |
Dom-iterator
Dom-iterator dom-iterator |
|
Metrics |
ssvc
|
Wed, 13 Nov 2024 05:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | All versions of the package dom-iterator are vulnerable to Arbitrary Code Execution due to use of the Function constructor without complete input sanitization. Function generates a new function body and thus care must be given to ensure that the inputs to Function are not attacker-controlled. The risks involved are similar to that of allowing attacker-controlled input to reach eval. | |
Weaknesses | CWE-94 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: snyk
Published: 2024-11-13T05:00:12.270Z
Updated: 2025-01-14T16:53:39.641Z
Reserved: 2023-12-22T12:33:20.123Z
Link: CVE-2024-21541
Vulnrichment
Updated: 2024-11-14T16:04:20.796Z
NVD
Status : Modified
Published: 2024-11-13T05:15:14.680
Modified: 2025-01-14T17:15:16.573
Link: CVE-2024-21541
Redhat
No data.