Remote code execution in ejs



Published: 2022-06-01
Risk High
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2022-29078
CWE-ID CWE-74
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
EJS
Web applications / JS libraries

Vendor EJS

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) Code injection

EUVDB-ID: #VU63903

Risk: High

CVSSv3.1:

CVE-ID: CVE-2022-29078

CWE-ID: CWE-74 - Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to improper input validation when parsing data passed to "settings[view options][outputFunctionName]". A remote attacker can send specially crafted request to the application, perform server-side template injection and execute arbitrary code on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

EJS: 3.0.1 - 3.1.6


CPE2.3 External links

http://eslam.io/posts/ejs-server-side-template-injection-rce/
http://github.com/mde/ejs/releases

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###