Arbitrary Code Injection Affecting accesslog package, versions *
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.59% (79th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JS-ACCESSLOG-2312099
- published 27 Feb 2022
- disclosed 8 Dec 2021
- credit OmniTaint
Introduced: 8 Dec 2021
CVE-2022-25760 Open this link in a new tabHow to fix?
There is no fixed version for accesslog
.
Overview
accesslog is a simple common/combined access log middleware
Affected versions of this package are vulnerable to Arbitrary Code Injection due to the usage of the Function
constructor without input sanitization.
If (attacker-controlled) user input is given to the format option of the package's exported constructor function
, it is possible for an attacker to execute arbitrary JavaScript code on the host that this package is being run on.
PoC
var accesslog = require('accesslog');
var handler = accesslog({
format: `\\\" + console.log('XSS');//`,
});
var req = {};
var res = {
end: function() {},
};
handler(req, res, function() {});
res.end();
References
CVSS Scores
version 3.1