Arbitrary Code Execution Affecting plug package, versions >=1.3.0 <1.3.2>=1.2.0-rc.0 <1.2.3>=1.1.0 <1.1.7<1.0.4


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.25% (66th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Code Execution vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-HEX-PLUG-1088058
  • published30 Mar 2021
  • disclosed28 Feb 2017
  • creditGriffin Byatt, Matthew Diaz

Introduced: 28 Feb 2017

CVE-2017-1000053  (opens in a new tab)
CWE-94  (opens in a new tab)

How to fix?

Upgrade plug to version 1.3.2, 1.2.3, 1.1.7, 1.0.4 or higher.

Overview

plug is a specification and conveniences for composable modules between web applications.

Affected versions of this package are vulnerable to Arbitrary Code Execution. The default serialization used by Plug session may result in code execution in certain situations. This attack can only be exploited if the attacker has access to your secret key as well as your signing/encryption salts as the session cookie is signed.

References

CVSS Scores

version 3.1