CVE-2022-25967

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-25967
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-25967.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-25967
Aliases
Published
2023-01-30T05:15:10Z
Modified
2025-01-15T02:18:18.161338Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Versions of the package eta before 2.0.0 are vulnerable to Remote Code Execution (RCE) by overwriting template engine configuration variables with view options received from The Express render API.

Note: This is exploitable only for users who are rendering templates with user-defined data.

References

Affected packages

Git / github.com/eta-dev/eta

Affected ranges

Type
GIT
Repo
https://github.com/eta-dev/eta
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

v1.*

v1.0.0
v1.0.0-beta.0
v1.0.0-beta.1
v1.0.0-beta.2
v1.0.0-beta.3
v1.0.0-beta.4
v1.0.1
v1.0.2
v1.0.3
v1.1.0
v1.1.1
v1.10.0
v1.10.1
v1.11.0
v1.12.0
v1.12.1
v1.12.2
v1.12.3
v1.13.0
v1.14.0
v1.14.1
v1.14.2
v1.2.0
v1.2.1
v1.2.2
v1.3.0
v1.4.0
v1.5.0
v1.6.0
v1.6.2
v1.7.0
v1.8.0
v1.9.0