CVE-2021-4329

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-4329
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-4329.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-4329
Aliases
Published
2023-03-05T19:15:10Z
Modified
2025-01-15T02:07:04.586424Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A vulnerability, which was classified as critical, has been found in json-logic-js 2.0.0. Affected by this issue is some unknown functionality of the file logic.js. The manipulation leads to command injection. Upgrading to version 2.0.1 is able to address this issue. The patch is identified as c1dd82f5b15d8a553bb7a0cfa841ab8a11a9c227. It is recommended to upgrade the affected component. VDB-222266 is the identifier assigned to this vulnerability.

References

Affected packages

Git / github.com/jwadhams/json-logic-js

Affected ranges

Type
GIT
Repo
https://github.com/jwadhams/json-logic-js
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

1.*

1.1.0
1.1.1
1.1.2
1.1.3
1.1.3-sets
1.2.0
1.2.1
1.2.2
1.2.3

2.*

2.0.0

v0.*

v0.1.0
v0.1.1
v0.1.2
v0.1.3
v0.2.0
v0.3.0
v0.4.0
v0.5.0
v0.6.0
v0.6.1
v0.6.2

v1.*

v1.0.0
v1.0.0-rc1
v1.0.1
v1.0.10
v1.0.11
v1.0.2
v1.0.3
v1.0.4
v1.0.5
v1.0.6
v1.0.7
v1.0.8
v1.0.8-method
v1.0.8-method2
v1.0.8-method3
v1.0.9