Arbitrary Code Execution in eslint-utils
Critical severity
GitHub Reviewed
Published
Aug 20, 2019
in
mysticatea/eslint-utils
•
Updated Nov 29, 2023
Description
Published to the GitHub Advisory Database
Aug 26, 2019
Reviewed
Jun 16, 2020
Last updated
Nov 29, 2023
Versions of
eslint-utils
>=1.2.0 or <1.4.1 are vulnerable to Arbitrary Code Execution. ThegetStaticValue
does not properly sanitize user input allowing attackers to supply malicious input that executes arbitrary code during the linting process. ThegetStringIfConstant
andgetPropertyName
functions are not affected.Recommendation
Upgrade to version 1.4.1 or later.
References