Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTNneDcteGh2Ny01bXgz

Arbitrary Code Execution in eslint-utils

Versions of eslint-utils >=1.2.0 or <1.4.1 are vulnerable to Arbitrary Code Execution. The getStaticValue does not properly sanitize user input allowing attackers to supply malicious input that executes arbitrary code during the linting process. The getStringIfConstant and getPropertyName functions are not affected.

Recommendation

Upgrade to version 1.4.1 or later.

Permalink: https://github.com/advisories/GHSA-3gx7-xhv7-5mx3
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTNneDcteGh2Ny01bXgz
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: over 5 years ago
Updated: about 1 year ago


CVSS Score: 9.8
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS Percentage: 0.0036
EPSS Percentile: 0.72513

Identifiers: GHSA-3gx7-xhv7-5mx3, CVE-2019-15657
References: Repository: https://github.com/mysticatea/eslint-utils
Blast Radius: 62.9

Affected Packages

npm:eslint-utils
Dependent packages: 1,189
Dependent repositories: 2,601,363
Downloads: 103,462,293 last month
Affected Version Ranges: >= 1.2.0, < 1.4.1
Fixed in: 1.4.1
All affected versions: 1.2.0, 1.3.0, 1.3.1, 1.4.0
All unaffected versions: 0.0.0, 1.0.0, 1.1.0, 1.4.1, 1.4.2, 1.4.3, 2.0.0, 2.1.0, 3.0.0