Enhancement: cves/2021/CVE-2021-32819.yaml by mp

patch-1
MostInterestingBotInTheWorld 2022-06-30 13:49:00 -04:00
parent c8a73b4a26
commit 49e5de712f
1 changed files with 6 additions and 5 deletions

View File

@ -1,17 +1,16 @@
id: CVE-2021-32819
info:
name: Nodejs squirrelly template engine RCE
name: Nodejs Squirrelly - Remote Code Execution
author: pikpikcu
severity: high
description: |
Squirrelly is a template engine implemented in JavaScript that works out of the box with ExpressJS. Squirrelly mixes pure template data with engine configuration
options through the Express render API. By overwriting internal configuration options remote code execution may be triggered in downstream applications. There is
currently no fix for these issues as of the publication of this CVE. The latest version of squirrelly is currently 8.0.8. For complete details refer to the referenced GHSL-2021-023.
Nodejs Squirrelly is susceptible to remote code execution. Squirrelly is a template engine implemented in JavaScript that works out of the box with ExpressJS. Squirrelly mixes pure template data with engine configuration options through the Express render API. By overwriting internal configuration options remote code execution may be triggered in downstream applications. There is currently no fix for these issues as of the publication of this CVE. The latest version of squirrelly is currently 8.0.8. For complete details refer to the referenced GHSL-2021-023.
reference:
- https://securitylab.github.com/advisories/GHSL-2021-023-squirrelly/
- https://www.linuxlz.com/aqld/2331.html
- https://blog.diefunction.io/vulnerabilities/ghsl-2021-023
- https://nvd.nist.gov/vuln/detail/CVE-2021-32819
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss-score: 8.8
@ -28,3 +27,5 @@ requests:
part: interactsh_protocol # Confirms the HTTP Interaction
words:
- "http"
# Enhanced by mp on 2022/06/30