Arbitrary Code Execution Affecting jsreport package, versions <2.6.0
Threat Intelligence
EPSS
0.91% (84th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JS-JSREPORT-1245513
- published 14 Apr 2021
- disclosed 13 Apr 2021
- credit Unknown
How to fix?
Upgrade jsreport
to version 2.6.0 or higher.
Overview
jsreport is a javascript based business reporting
Affected versions of this package are vulnerable to Arbitrary Code Execution. The module Puppeteer
, which is a headless Chrome Node API, is used for turning a user's HTML into pdf
files. The way this is applied allows fetching URLs and sending requests defined in an HTML file by a user which is known as SSRF (Server Side Request Forgery).
Chaining this with CVE-2020-8128 (SNYK-JS-SCRIPTMANAGER-548308) can lead to remote code execution.
References
CVSS Scores
version 3.1