{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-45390","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2024-08-28T20:21:32.801Z","datePublished":"2024-09-03T19:37:31.763Z","dateUpdated":"2024-09-03T20:01:40.797Z"},"containers":{"cna":{"title":"@blakeembrey/template vulnerable to code injection when attacker controls template input","problemTypes":[{"descriptions":[{"cweId":"CWE-94","lang":"en","description":"CWE-94: Improper Control of Generation of Code ('Code Injection')","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":7.3,"baseSeverity":"HIGH","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","version":"3.1"}}],"references":[{"name":"https://github.com/blakeembrey/js-template/security/advisories/GHSA-q765-wm9j-66qj","tags":["x_refsource_CONFIRM"],"url":"https://github.com/blakeembrey/js-template/security/advisories/GHSA-q765-wm9j-66qj"},{"name":"https://github.com/blakeembrey/js-template/commit/b8d9aa999e464816c6cfb14acd1ad0f5d1e335aa","tags":["x_refsource_MISC"],"url":"https://github.com/blakeembrey/js-template/commit/b8d9aa999e464816c6cfb14acd1ad0f5d1e335aa"}],"affected":[{"vendor":"blakeembrey","product":"js-template","versions":[{"version":"< 1.2.0","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2024-09-03T19:37:31.763Z"},"descriptions":[{"lang":"en","value":"@blakeembrey/template is a string template library. Prior to version 1.2.0, it is possible to inject and run code within the template if the attacker has access to write the template name. Version 1.2.0 contains a patch. As a workaround, don't pass untrusted input as the template display name, or don't use the display name feature."}],"source":{"advisory":"GHSA-q765-wm9j-66qj","discovery":"UNKNOWN"}},"adp":[{"affected":[{"vendor":"blakeembrey","product":"js-template","cpes":["cpe:2.3:a:blakeembrey:js-template:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"1.2.0","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-03T19:59:11.259079Z","id":"CVE-2024-45390","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-03T20:01:40.797Z"}}]}}