You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Snyk Description: ## Overview ejs is a popular JavaScript templating engine.
Affected versions of this package are vulnerable to Arbitrary Code Injection via the render and renderFile. If external input is flowing into the options parameter, an attacker is able run arbitrary code. This include the filename, compileDebug, and client option.
Package Name: ejs
Package Version: ['1.0.0', '0.8.8']
Package Manager: npm
Target File: package.json
Severity Level: medium
Snyk ID: SNYK-JS-EJS-1049328
Snyk CVE: No CVE
Snyk CWE: CWE-94
Link to issue in Snyk: https://app.snyk.io/org/cse_rhicksiii91/project/14f822de-b806-4bd7-9ad2-767a7feebe1d
Snyk Description: ## Overview
ejs is a popular JavaScript templating engine.
Affected versions of this package are vulnerable to Arbitrary Code Injection via the
render
andrenderFile
. If external input is flowing into theoptions
parameter, an attacker is able run arbitrary code. This include thefilename
,compileDebug
, andclient
option.POC
Remediation
Upgrade
ejs
to version 3.1.6 or higher.References
The text was updated successfully, but these errors were encountered: