Untrusted User Input in Send Could Lead to Code Execution
CVE-2024-43799

4.7MEDIUM

Key Information:

Vendor

Pillarjs

Status
Vendor
CVE Published:
10 September 2024

What is CVE-2024-43799?

Send is a library for streaming files from the file system as a http response. Send passes untrusted user input to SendStream.redirect() which executes untrusted code. This issue is patched in send 0.19.0.

Affected Version(s)

send < 0.19.0

References

CVSS V3.1

Score:
4.7
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.