漏洞信息详情
serialize-javascript 代码问题漏洞
漏洞简介
Verizon serialize-javascript是美国威瑞森电信(Verizon)公司的一款支持将JavaScript序列化为 JSON超集的软件包。
serialize-javascript 3.1.0之前版本中存在代码问题漏洞。远程攻击者可借助index.js文件中的‘deleteFunctions’函数利用该漏洞注入任意代码。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://github.com/yahoo/serialize-javascript/commit/f21a6fb3ace2353413761e79717b2d210ba6ccbd
参考网址
来源:MISC
链接:https://github.com/yahoo/serialize-javascript/commit/f21a6fb3ace2353413761e79717b2d210ba6ccbd
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2315/
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2020-7660
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158278/Red-Hat-Security-Advisory-2020-2796-01.html
来源:www.nsfocus.net
链接:http://www.nsfocus.net/vulndb/48791
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2283/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158363/Red-Hat-Security-Advisory-2020-2861-01.html
受影响实体
暂无
补丁
- serialize-javascript 代码问题漏洞的修复措施<!--2020-6-1-->
还没有评论,来说两句吧...