Arbitrary Code Execution Vulnerability in Lilconfig Versions 3.1.0-3.1.1
CVE-2024-21537
8.8HIGH
Key Information:
- Vendor
- Lilconfig
- Status
- Lilconfig
- Vendor
- CVE Published:
- 31 October 2024
Summary
Versions of the lilconfig package, specifically those from 3.1.0 and earlier than 3.1.1, are susceptible to arbitrary code execution. This vulnerability arises from improper usage of the eval function within the dynamicImport functionality. Attackers can exploit this flaw by sending specially crafted malicious input through the defaultLoaders function, potentially leading to unauthorized execution of code within the affected applications. Developers using lilconfig are urged to upgrade to version 3.1.1 or later to mitigate this risk.
Affected Version(s)
lilconfig 3.1.0 < 3.1.1
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database
Credit
Anton Kastritskiy