Skip to content

Commit e51bbf3

Browse files
committed
1 parent 8896408 commit e51bbf3

File tree

1 file changed

+3
-7
lines changed

1 file changed

+3
-7
lines changed

advisories/github-reviewed/2024/10/GHSA-pppg-cpfq-h7wr/GHSA-pppg-cpfq-h7wr.json

Lines changed: 3 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,14 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-pppg-cpfq-h7wr",
4-
"modified": "2024-10-21T19:02:54Z",
4+
"modified": "2024-10-21T19:02:55Z",
55
"published": "2024-10-11T15:30:32Z",
66
"aliases": [
77
"CVE-2024-21534"
88
],
99
"summary": "JSONPath Plus Remote Code Execution (RCE) Vulnerability",
10-
"details": "Versions of the package jsonpath-plus before 10.0.0 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of vm in Node.\n\n**Note:**\n\nThe unsafe behavior is still available after applying the fix but it is not turned on by default.",
10+
"details": "Versions of the package jsonpath-plus before 10.0.7 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of vm in Node.\n\n**Note:**\n\nThe unsafe behavior is still available after applying the fix but it is not turned on by default.",
1111
"severity": [
12-
{
13-
"type": "CVSS_V3",
14-
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
15-
},
1612
{
1713
"type": "CVSS_V4",
1814
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
@@ -32,7 +28,7 @@
3228
"introduced": "0"
3329
},
3430
{
35-
"fixed": "10.0.0"
31+
"fixed": "10.0.7"
3632
}
3733
]
3834
}

0 commit comments

Comments
 (0)