icon

We found results for “

CVE-2021-21412

Good to know:

icon

Date: March 30, 2021

Potential for arbitrary code execution in npm package @thi.ng/egf `#gpg`-tagged property values (only if `decrypt: true` option is enabled). PR with patch has been submitted and will has been released as of v0.4.0 By default the EGF parse functions do NOT attempt to decrypt values (since GPG only available in non-browser env). However, if GPG encrypted values are used/required: 1. Perform a regex search for `#gpg`-tagged values in the EGF source file/string and check for backtick (\`) chars in the encrypted value string 2. Replace/remove them or skip parsing if present.

Language: TYPE_SCRIPT

Severity Score

Severity Score

Weakness Type (CWE)

OS Command Injections

CWE-78

Top Fix

icon

Upgrade Version

Upgrade to version @thi.ng/egf@0.4.0

Learn More

CVSS v3

Base Score:
Attack Vector (AV):
Attack Complexity (AC):
Privileges Required (PR):
User Interaction (UI):
Scope (S):
Confidentiality (C): PARTIAL
Integrity (I): PARTIAL
Availability (A): PARTIAL

CVSS v2

Base Score:
Access Vector (AV):
Access Complexity (AC):
Authentication (AU):
Confidentiality (C): NONE
Integrity (I): HIGH
Availability (A): NONE
Additional information:

Do you need more information?

Contact Us