CVE-2024-14020

Source
https://cve.org/CVERecord?id=CVE-2024-14020
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-14020.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-14020
Aliases
Published
2026-01-07T12:16:44.960Z
Modified
2026-03-01T08:11:36.442095Z
Severity
  • 2.3 (Low) CVSS_V4 - CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X CVSS Calculator
Summary
[none]
Details

A weakness has been identified in carboneio carbone up to fbcd349077ad0e8748be73eab2a82ea92b6f8a7e. This impacts an unknown function of the file lib/input.js of the component Formatter Handler. Executing a manipulation can lead to improperly controlled modification of object prototype attributes. The attack can be launched remotely. This attack is characterized by high complexity. The exploitability is said to be difficult. Upgrading to version 3.5.6 will fix this issue. This patch is called 04f9feb24bfca23567706392f9ad2c53bbe4134e. You should upgrade the affected component. A successful exploitation can "only occur if the parent NodeJS application has the same security issue".

References

Affected packages

Git / github.com/carboneio/carbone

Affected ranges

Type
GIT
Repo
https://github.com/carboneio/carbone
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*
1.0.0
1.0.1
1.1.0
1.2.0
1.2.1
2.*
2.0.0
2.0.0-beta.0
2.0.0-beta.1
2.0.0-beta.2
2.0.0-beta.3
2.0.0-beta.4
2.0.0-beta.5
2.0.0-beta.6
2.0.0-beta.7
2.0.0-beta.8
2.0.0-beta.9
2.0.1
2.0.2
2.1.0
2.1.1
3.*
3.1.0
3.2.3
3.5.5
carbone@2.*
carbone@2.0.0-beta.4

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-14020.json"