CVE-2024-21541

Versions of the package dom-iterator before 1.0.1 are vulnerable to Arbitrary Code Execution due to use of the Function constructor without complete input sanitization. Function generates a new function body and thus care must be given to ensure that the inputs to Function are not attacker-controlled. The risks involved are similar to that of allowing attacker-controlled input to reach eval.
Configurations

Configuration 1 (hide)

cpe:2.3:a:matthewmueller:dom-iterator:*:*:*:*:*:node.js:*:*

History

14 Jan 2025, 17:15

Type Values Removed Values Added
References
  • () https://github.com/matthewmueller/dom-iterator/commit/9e0e0fad5a251de5b42feb326c4204eb04080805 -
  • () https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-8383166 -
Summary (en) All versions of the package dom-iterator are vulnerable to Arbitrary Code Execution due to use of the Function constructor without complete input sanitization. Function generates a new function body and thus care must be given to ensure that the inputs to Function are not attacker-controlled. The risks involved are similar to that of allowing attacker-controlled input to reach eval. (en) Versions of the package dom-iterator before 1.0.1 are vulnerable to Arbitrary Code Execution due to use of the Function constructor without complete input sanitization. Function generates a new function body and thus care must be given to ensure that the inputs to Function are not attacker-controlled. The risks involved are similar to that of allowing attacker-controlled input to reach eval.

Information

Published : 2024-11-13 05:15

Updated : 2025-01-14 17:15


NVD link : CVE-2024-21541

Mitre link : CVE-2024-21541

CVE.ORG link : CVE-2024-21541


JSON object : View

Products Affected

matthewmueller

  • dom-iterator
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')