Lucene search

K
nvd[email protected]NVD:CVE-2023-26145
HistorySep 28, 2023 - 5:15 a.m.

CVE-2023-26145

2023-09-2805:15:45
CWE-94
CWE-78
CWE-77
web.nvd.nist.gov
6
pydash package
command injection
python object.

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

8

Confidence

High

EPSS

0.001

Percentile

33.4%

This affects versions of the package pydash before 6.0.0. A number of pydash methods such as pydash.objects.invoke() and pydash.collections.invoke_map() accept dotted paths (Deep Path Strings) to target a nested Python object, relative to the original source object. These paths can be used to target internal class attributes and dict items, to retrieve, modify or invoke nested Python objects.

Note:

The pydash.objects.invoke() method is vulnerable to Command Injection when the following prerequisites are satisfied:

  1. The source object (argument 1) is not a built-in object such as list/dict (otherwise, the init.globals path is not accessible)

  2. The attacker has control over argument 2 (the path string) and argument 3 (the argument to pass to the invoked method)

The pydash.collections.invoke_map() method is also vulnerable, but is harder to exploit as the attacker does not have direct control over the argument to be passed to the invoked function.

Affected configurations

Nvd
Node
derrickgillandpydashRange<6.0.0
VendorProductVersionCPE
derrickgillandpydash*cpe:2.3:a:derrickgilland:pydash:*:*:*:*:*:*:*:*

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

8

Confidence

High

EPSS

0.001

Percentile

33.4%

Related for NVD:CVE-2023-26145