Versions of the package eta before 2.0.0 are vulnerable to Remote Code Execution (RCE) by overwriting template engine configuration variables with view options received from The Express render API. Note: This is exploitable only for users who are rendering templates with user-defined data
Reporter | Title | Published | Views | Family All 9 |
---|---|---|---|---|
![]() | CVE-2022-25967 | 30 Jan 202305:00 | – | cvelist |
![]() | CVE-2022-25967 | 30 Jan 202305:15 | – | osv |
![]() | GHSA-MF6X-HRGR-658F Eta vulnerable to Code Injection via templates rendered with user-defined data | 30 Jan 202306:30 | – | osv |
![]() | Remote code execution | 30 Jan 202305:15 | – | prion |
![]() | CVE-2022-25967 | 30 Jan 202305:15 | – | cve |
![]() | CVE-2022-25967 | 14 Mar 202305:13 | – | redhatcve |
![]() | CVE-2022-25967 | 30 Jan 202305:00 | – | vulnrichment |
![]() | Eta vulnerable to Code Injection via templates rendered with user-defined data | 30 Jan 202306:30 | – | github |
![]() | Remote Code Execution (RCE) | 6 Feb 202305:11 | – | veracode |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo