From e51bbf3518e5d60b013e15e181d89603262071de Mon Sep 17 00:00:00 2001 From: Jonathan Dong Date: Tue, 12 Nov 2024 15:08:23 +0000 Subject: [PATCH] Improve GHSA-pppg-cpfq-h7wr --- .../10/GHSA-pppg-cpfq-h7wr/GHSA-pppg-cpfq-h7wr.json | 10 +++------- 1 file changed, 3 insertions(+), 7 deletions(-) diff --git a/advisories/github-reviewed/2024/10/GHSA-pppg-cpfq-h7wr/GHSA-pppg-cpfq-h7wr.json b/advisories/github-reviewed/2024/10/GHSA-pppg-cpfq-h7wr/GHSA-pppg-cpfq-h7wr.json index 9f63490899668..f2b3cda37283e 100644 --- a/advisories/github-reviewed/2024/10/GHSA-pppg-cpfq-h7wr/GHSA-pppg-cpfq-h7wr.json +++ b/advisories/github-reviewed/2024/10/GHSA-pppg-cpfq-h7wr/GHSA-pppg-cpfq-h7wr.json @@ -1,18 +1,14 @@ { "schema_version": "1.4.0", "id": "GHSA-pppg-cpfq-h7wr", - "modified": "2024-10-21T19:02:54Z", + "modified": "2024-10-21T19:02:55Z", "published": "2024-10-11T15:30:32Z", "aliases": [ "CVE-2024-21534" ], "summary": "JSONPath Plus Remote Code Execution (RCE) Vulnerability", - "details": "Versions of the package jsonpath-plus before 10.0.0 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of vm in Node.\n\n**Note:**\n\nThe unsafe behavior is still available after applying the fix but it is not turned on by default.", + "details": "Versions of the package jsonpath-plus before 10.0.7 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of vm in Node.\n\n**Note:**\n\nThe unsafe behavior is still available after applying the fix but it is not turned on by default.", "severity": [ - { - "type": "CVSS_V3", - "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" - }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" @@ -32,7 +28,7 @@ "introduced": "0" }, { - "fixed": "10.0.0" + "fixed": "10.0.7" } ] }