diff --git a/advisories/github-reviewed/2024/10/GHSA-pppg-cpfq-h7wr/GHSA-pppg-cpfq-h7wr.json b/advisories/github-reviewed/2024/10/GHSA-pppg-cpfq-h7wr/GHSA-pppg-cpfq-h7wr.json index 9f634908996687..f2b3cda37283e9 100644 --- a/advisories/github-reviewed/2024/10/GHSA-pppg-cpfq-h7wr/GHSA-pppg-cpfq-h7wr.json +++ b/advisories/github-reviewed/2024/10/GHSA-pppg-cpfq-h7wr/GHSA-pppg-cpfq-h7wr.json @@ -1,18 +1,14 @@ { "schema_version": "1.4.0", "id": "GHSA-pppg-cpfq-h7wr", - "modified": "2024-10-21T19:02:54Z", + "modified": "2024-10-21T19:02:55Z", "published": "2024-10-11T15:30:32Z", "aliases": [ "CVE-2024-21534" ], "summary": "JSONPath Plus Remote Code Execution (RCE) Vulnerability", - "details": "Versions of the package jsonpath-plus before 10.0.0 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of vm in Node.\n\n**Note:**\n\nThe unsafe behavior is still available after applying the fix but it is not turned on by default.", + "details": "Versions of the package jsonpath-plus before 10.0.7 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of vm in Node.\n\n**Note:**\n\nThe unsafe behavior is still available after applying the fix but it is not turned on by default.", "severity": [ - { - "type": "CVSS_V3", - "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" - }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" @@ -32,7 +28,7 @@ "introduced": "0" }, { - "fixed": "10.0.0" + "fixed": "10.0.7" } ] }