[Pkg-javascript-devel] Bug#986171: underscore: CVE-2021-23358
Moritz Muehlenhoff
jmm at inutil.org
Wed Mar 31 16:30:33 BST 2021
On Tue, Mar 30, 2021 at 11:00:00PM +0200, Yadd wrote:
> Le 30/03/2021 à 21:40, Salvatore Bonaccorso a écrit :
> > Source: underscore
> > Version: 1.9.1~dfsg-1
> > Severity: grave
> > Tags: security upstream
> > Justification: user security hole
> > X-Debbugs-Cc: carnil at debian.org, Debian Security Team <team at security.debian.org>,yadd at debian.org
> >
> > Hi,
> >
> > The following vulnerability was published for underscore.
> >
> > CVE-2021-23358[0]:
> > | The package underscore from 1.13.0-0 and before 1.13.0-2, from 1.3.2
> > | and before 1.12.1 are vulnerable to Arbitrary Code Execution via the
> > | template function, particularly when a variable property is passed as
> > | an argument as it is not sanitized.
> >
> > [1] provides a POC to verify the issue.
> >
> >
> > If you fix the vulnerability please also make sure to include the
> > CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> >
> > For further information see:
> >
> > [0] https://security-tracker.debian.org/tracker/CVE-2021-23358
> > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23358
> > [1] https://snyk.io/vuln/SNYK-JS-UNDERSCORE-1080984
> >
> > Regards,
> > Salvatore
>
> Hi,
>
> here is a debdiff for buster including:
> * backport of upstream patch
> * autopkgtest file (tested)
Hi,
looks good! Please upload to security-master
Cheers,
Moritz
More information about the Pkg-javascript-devel
mailing list