Lucene search

K
githubGitHub Advisory DatabaseGHSA-H95X-26F3-88HR
HistoryJun 20, 2024 - 6:34 p.m.

js2py allows remote code execution

2024-06-2018:34:08
CWE-94
GitHub Advisory Database
github.com
17
js2py
remote code execution
software vulnerability
api call

CVSS3

5.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

AI Score

7.3

Confidence

High

EPSS

0.001

Percentile

22.7%

An issue in the component js2py.disable_pyimport() of js2py up to v0.74 allows attackers to execute arbitrary code via a crafted API call.

Affected configurations

Vulners
Node
js2pyRange0.74
VendorProductVersionCPE
*js2py*cpe:2.3:a:*:js2py:*:*:*:*:*:*:*:*

CVSS3

5.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

AI Score

7.3

Confidence

High

EPSS

0.001

Percentile

22.7%