You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The ejs (aka Embedded JavaScript templates) package 3.1.6 for Node.js allows server-side template injection in settings[view options][outputFunctionName]. This is parsed as an internal option, and overwrites the outputFunctionName option with an arbitrary OS command (which is executed upon template compilation).
mend-for-github-combot
changed the title
CVE-2022-29078 (High) detected in ejs-2.7.3.tgz
CVE-2022-29078 (Critical) detected in ejs-2.7.3.tgz
Jul 2, 2023
CVE-2022-29078 - Critical Severity Vulnerability
Vulnerable Library - ejs-2.7.3.tgz
Embedded JavaScript templates
Library home page: https://registry.npmjs.org/ejs/-/ejs-2.7.3.tgz
Path to dependency file: /webui/package.json
Path to vulnerable library: /webui/node_modules/ejs/package.json
Dependency Hierarchy:
Found in HEAD commit: 5fb0a687f6f4614ef22e971903247af1c371d3c8
Found in base branch: master
Vulnerability Details
The ejs (aka Embedded JavaScript templates) package 3.1.6 for Node.js allows server-side template injection in settings[view options][outputFunctionName]. This is parsed as an internal option, and overwrites the outputFunctionName option with an arbitrary OS command (which is executed upon template compilation).
Publish Date: 2022-04-25
URL: CVE-2022-29078
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29078~
Release Date: 2022-04-25
Fix Resolution (ejs): 3.1.7
Direct dependency fix Resolution (@quasar/app): 2.3.1
The text was updated successfully, but these errors were encountered: