You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
eslint-utils advisory
Versions of eslint-utils >=1.2.0 or <1.4.1 are vulnerable to Arbitrary Code Execution. The getStaticValue does not properly sanitize user input allowing attackers to supply malicious input that executes arbitrary code during the linting process. The getStringIfConstant and getPropertyName functions are not affected. @heapwolf @datcxx
The text was updated successfully, but these errors were encountered:
No CVE
CWE CWE-94
References: - ESLint release
Versions of
eslint-utils
>=1.2.0 or <1.4.1 are vulnerable to Arbitrary Code Execution. ThegetStaticValue
does not properly sanitize user input allowing attackers to supply malicious input that executes arbitrary code during the linting process. ThegetStringIfConstant
andgetPropertyName
functions are not affected.@heapwolf @datcxx
The text was updated successfully, but these errors were encountered: