Skip to content

Arbitrary Code Execution in json-ptr

High severity GitHub Reviewed Published May 26, 2021 to the GitHub Advisory Database • Updated Jan 9, 2023

Package

npm json-ptr (npm)

Affected versions

< 2.1.0

Patched versions

2.1.0

Description

There is a security vulnerability in json-ptr versions prior to v2.1.0 in which an unscrupulous actor may execute arbitrary code. If your code sends un-sanitized user input to json-ptr's .get() method, your project is vulnerable to this injection-style vulnerability.

References

Reviewed May 26, 2021
Published to the GitHub Advisory Database May 26, 2021
Last updated Jan 9, 2023

Severity

High

EPSS score

Weaknesses

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component. Learn more on MITRE.

CVE ID

No known CVE

GHSA ID

GHSA-rrqv-vjrw-hrcr

Source code

No known source code
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.