Arbitrary Code Execution Vulnerability in Lilconfig Versions 3.1.0-3.1.1

CVE-2024-21537

8.8HIGH

Key Information:

Vendor
Lilconfig
Status
Lilconfig
Vendor
CVE Published:
31 October 2024

Summary

Versions of the lilconfig package, specifically those from 3.1.0 and earlier than 3.1.1, are susceptible to arbitrary code execution. This vulnerability arises from improper usage of the eval function within the dynamicImport functionality. Attackers can exploit this flaw by sending specially crafted malicious input through the defaultLoaders function, potentially leading to unauthorized execution of code within the affected applications. Developers using lilconfig are urged to upgrade to version 3.1.1 or later to mitigate this risk.

Affected Version(s)

lilconfig 3.1.0 < 3.1.1

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database

Credit

Anton Kastritskiy
.