Eval injection vulnerability in the internals.batch function in lib/batch.js in the bassmaster plugin before 1.5.2 for the hapi server framework for Node.js allows remote attackers to execute arbitrary Javascript code via unspecified vectors.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://nodesecurity.io/advisories/bassmaster_js_injection | third party advisory |
http://www.openwall.com/lists/oss-security/2014/09/30/10 | third party advisory mailing list |
http://www.securityfocus.com/bid/70180 | third party advisory vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/96730 | third party advisory vdb entry |
https://www.exploit-db.com/exploits/40689/ | third party advisory vdb entry exploit |
https://github.com/hapijs/bassmaster/commit/b751602d8cb7194ee62a61e085069679525138c4 | exploit |