CVE-2020-7673

EUVD-2021-1043
node-extend through 0.2.0 is vulnerable to Arbitrary Code Execution. User input provided to the argument `A` of `extend` function`(A,B,as,isAargs)` located within `lib/extend.js` is executed by the `eval` function, resulting in code execution.
Code Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 78%
Affected Products (NVD)
VendorProductVersion
node-extend_projectnode-extend
𝑥
≤ 0.2.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
node-extend
bookworm
3.0.2+~3.0.1-3
fixed
bullseye
3.0.2-1
fixed
sid
3.0.2+~3.0.1-3
fixed
trixie
3.0.2+~3.0.1-3
fixed