Lucene search

K
githubGitHub Advisory DatabaseGHSA-5J3G-JFQ3-7JWX
HistoryOct 24, 2017 - 6:33 p.m.

Arbitrary JavaScript Execution in bassmaster

2017-10-2418:33:36
CWE-94
GitHub Advisory Database
github.com
49

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.895

Percentile

98.8%

A vulnerability exists in bassmaster <= 1.5.1 that allows for an attacker to provide arbitrary JavaScript that is then executed server side via eval.

Recommendation

Update to bassmaster version 1.5.2 or greater.

Affected configurations

Vulners
Node
bassmaster_projectbassmasterRange<1.5.2
VendorProductVersionCPE
bassmaster_projectbassmaster*cpe:2.3:a:bassmaster_project:bassmaster:*:*:*:*:*:*:*:*

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.895

Percentile

98.8%