endpointlabs / VulnerableDotNetCore3Project

.Net Core 3.0
0 stars 0 forks source link

CVE-2020-7660 | serialize-javascript:1.9.1 (CWE-502) #89

Closed ckalpakoglu closed 1 year ago

ckalpakoglu commented 1 year ago

Due Date: 2023-01-10

A high severity vulnerability has been discovered in your project.

Project Name: kondukto-ui-vue

Scanner Name: dependabot

Cwe ID: 502

Cwe Name: Deserialization of Untrusted Data

Cwe Link: https://cwe.mitre.org/data/definitions/502.html

File: package-lock.json

Packages:

References:

Training(Secure Code Warrior):


Tool Description: ### Summary

Insecure serialization leading to RCE in serialize-javascript

Fixed Patch

3.1.0

serialize-javascript prior to 3.1.0 allows remote attackers to inject arbitrary code via the function "deleteFunctions" within "index.js".

An object such as {"foo": /1"/, "bar": "a\"@__R--0__@"} was serialized as {"foo": /1"/, "bar": "a\/1"/}, which allows an attacker to escape the bar key. This requires the attacker to control the values of both foo and bar and guess the value of ``. The UID has a keyspace of approximately 4 billion making it a realistic network attack.

Kondukto Link: https://82.kondukto.local/projects/63b2e875fcd0c2a01b845757/vulns/appsec?page=1&perPage=15&id=in:63bbc8a5b3a8a9664878e700 Deeplink: https://github.com/advisories/GHSA-hxcc-f52p-wc94

ckalpakoglu commented 1 year ago

The issue has been closed by Kondukto since it is marked as won't fix.