Versions of hot-formula-parser prior to 3.0.1 are vulnerable to Command Injection. The package fails to sanitize values passed to the parse function and concatenates it in an eval call. If a value of the formula is supplied by user-controlled input it may allow attackers to run arbitrary commands in the server.
Parsing the following formula creates a test file in the present directory:
"SUM([(function(){require('child_process').execSync('touch test')})(),2])"
Upgrade to version 3.0.1 or later.
{
"github_reviewed_at": "2020-05-06T19:32:05Z",
"github_reviewed": true,
"nvd_published_at": null,
"severity": "CRITICAL",
"cwe_ids": [
"CWE-94"
]
}