GHSA-rj44-gpjc-29r7

Suggest an improvement
Source
https://github.com/advisories/GHSA-rj44-gpjc-29r7
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/04/GHSA-rj44-gpjc-29r7/GHSA-rj44-gpjc-29r7.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-rj44-gpjc-29r7
Aliases
Related
Published
2021-04-06T17:22:41Z
Modified
2026-01-30T01:52:46.429303Z
Severity
  • 6.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[thi.ng/egf] Potential arbitrary code execution of `#gpg`-tagged property values
Details

Impact

Potential for arbitrary code execution in #gpg-tagged property values (only if decrypt: true option is enabled)

Patches

A fix has already been released as v0.4.0

Workarounds

By default, EGF parse functions do NOT attempt to decrypt values (since GPG is only available in non-browser env).

However, if GPG encrypted values are used/required:

  1. Perform a regex search for #gpg-tagged values in the EGF source file/string and check for backtick (`) chars in the encrypted value string
  2. Replace/remove them or skip parsing if present...

References

https://github.com/thi-ng/umbrella/security/advisories/GHSA-rj44-gpjc-29r7#advisory-comment-65261

For more information

If you have any questions or comments about this advisory, please open an issue in the thi.ng/umbrella repo, of which this package is part of.

Database specific
{
    "cwe_ids": [
        "CWE-78"
    ],
    "github_reviewed": true,
    "nvd_published_at": "2021-03-30T18:15:00Z",
    "severity": "MODERATE",
    "github_reviewed_at": "2021-03-30T17:40:22Z"
}
References

Affected packages

npm / @thi.ng/egf

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.4.0

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/04/GHSA-rj44-gpjc-29r7/GHSA-rj44-gpjc-29r7.json"