漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Remote code execution via the browser when running the test locally in nuxt
Vulnerability Description
Nuxt is a free and open-source framework to create full-stack web applications and websites with Vue.js. Due to the insufficient validation of the `path` parameter in the NuxtTestComponentWrapper, an attacker can execute arbitrary JavaScript on the server side, which allows them to execute arbitrary commands. Users who open a malicious web page in the browser while running the test locally are affected by this vulnerability, which results in the remote code execution from the malicious web page. Since web pages can send requests to arbitrary addresses, a malicious web page can repeatedly try to exploit this vulnerability, which then triggers the exploit when the test server starts.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Vulnerability Type
对生成代码的控制不恰当(代码注入)
Vulnerability Title
Nuxt 安全漏洞
Vulnerability Description
Nuxt是Nuxt开源的一个免费的开源框架。 Nuxt 3.4.0版本至3.12.4之前版本存在安全漏洞,该漏洞源于参数的验证不足,攻击者可以在服务器端执行任意JavaScript,进而执行任意命令。
CVSS Information
N/A
Vulnerability Type
N/A