{"containers":{"cna":{"affected":[{"product":"node-import","vendor":"n/a","versions":[{"lessThan":"unspecified","status":"affected","version":"0","versionType":"custom"}]}],"credits":[{"lang":"en","value":"JHU System Security Lab"}],"datePublic":"2022-07-25T00:00:00.000Z","descriptions":[{"lang":"en","value":"This affects all versions of package node-import. The \"params\" argument of module function can be controlled by users without any sanitization.b. This is then provided to the “eval” function located in line 79 in the index file \"index.js\"."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":8.6,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","exploitCodeMaturity":"PROOF_OF_CONCEPT","integrityImpact":"LOW","privilegesRequired":"NONE","remediationLevel":"UNAVAILABLE","reportConfidence":"CONFIRMED","scope":"UNCHANGED","temporalScore":8.1,"temporalSeverity":"HIGH","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L/E:P/RL:U/RC:C","version":"3.1"}}],"problemTypes":[{"descriptions":[{"description":"Arbitrary Code Execution","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2022-07-25T14:07:56.000Z","orgId":"bae035ff-b466-4ff4-94d0-fc9efd9e1730","shortName":"snyk"},"references":[{"tags":["x_refsource_MISC"],"url":"https://security.snyk.io/vuln/SNYK-JS-NODEIMPORT-571691"},{"tags":["x_refsource_MISC"],"url":"https://github.com/mahdaen/node-import/blob/master/index.js%23L79"}],"title":"Arbitrary Code Execution","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"report@snyk.io","DATE_PUBLIC":"2022-07-25T14:04:01.659312Z","ID":"CVE-2020-7678","STATE":"PUBLIC","TITLE":"Arbitrary Code Execution"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"node-import","version":{"version_data":[{"version_affected":">=","version_value":"0"}]}}]},"vendor_name":"n/a"}]}},"credit":[{"lang":"eng","value":"JHU System Security Lab"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"This affects all versions of package node-import. The \"params\" argument of module function can be controlled by users without any sanitization.b. This is then provided to the “eval” function located in line 79 in the index file \"index.js\"."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":8.6,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L/E:P/RL:U/RC:C","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Arbitrary Code Execution"}]}]},"references":{"reference_data":[{"name":"https://security.snyk.io/vuln/SNYK-JS-NODEIMPORT-571691","refsource":"MISC","url":"https://security.snyk.io/vuln/SNYK-JS-NODEIMPORT-571691"},{"name":"https://github.com/mahdaen/node-import/blob/master/index.js%23L79","refsource":"MISC","url":"https://github.com/mahdaen/node-import/blob/master/index.js%23L79"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T09:41:00.467Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://security.snyk.io/vuln/SNYK-JS-NODEIMPORT-571691"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/mahdaen/node-import/blob/master/index.js%23L79"}]}]},"cveMetadata":{"assignerOrgId":"bae035ff-b466-4ff4-94d0-fc9efd9e1730","assignerShortName":"snyk","cveId":"CVE-2020-7678","datePublished":"2022-07-25T14:07:56.881Z","dateReserved":"2020-01-21T00:00:00.000Z","dateUpdated":"2024-09-17T01:36:04.103Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}