Improper Input Validation The advisory has been revoked - it doesn't affect any version of package node-extend  (opens in a new tab)


Threat Intelligence

EPSS
1.29% (86th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN11-NODEEXTEND-604530
  • published19 Aug 2020
  • disclosed10 Jun 2020

Introduced: 10 Jun 2020

CVE-2020-7673  (opens in a new tab)
CWE-20  (opens in a new tab)

Amendment

The Debian security team deemed this advisory irrelevant for Debian:11.

NVD Description

Note: Versions mentioned in the description apply only to the upstream node-extend package and not the node-extend package as distributed by Debian.

node-extend through 0.2.0 is vulnerable to Arbitrary Code Execution. User input provided to the argument A of extend function(A,B,as,isAargs) located within lib/extend.js is executed by the eval function, resulting in code execution.