The package convert-svg-core before 0.6.2 are vulnerable to Remote Code Injection via sending an SVG file containing the payload.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://security.snyk.io/vuln/SNYK-JS-CONVERTSVGCORE-2849633 | exploit third party advisory patch |
https://github.com/neocotic/convert-svg/pull/82 | third party advisory patch |
https://github.com/neocotic/convert-svg/issues/81 | issue tracking exploit third party advisory |
https://github.com/neocotic/convert-svg/commit/7e6031ac7427cf82cf312cb4a25040f2e6efe7a5 | third party advisory patch |