漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Happy DOM ECMAScriptModuleCompiler: unsanitized export names are interpolated as executable code
Vulnerability Description
Happy DOM is a JavaScript implementation of a web browser without its graphical user interface. In versions 15.10.0 through 20.8.7, a code injection vulnerability in `ECMAScriptModuleCompiler` allows an attacker to achieve Remote Code Execution (RCE) by injecting arbitrary JavaScript expressions inside `export { }` declarations in ES module scripts processed by happy-dom. The compiler directly interpolates unsanitized content into generated code as an executable expression, and the quote filter does not strip backticks, allowing template literal-based payloads to bypass sanitization. Version 20.8.8 fixes the issue.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Vulnerability Type
对生成代码的控制不恰当(代码注入)
Vulnerability Title
happy-dom 代码注入漏洞
Vulnerability Description
happy-dom是David Ortner个人开发者的一种没有图形用户界面的 web 浏览器的 JavaScript 实现。 happy-dom 20.8.7及之前版本存在代码注入漏洞,该漏洞源于ECMAScriptModuleCompiler存在代码注入问题,可能导致攻击者通过注入任意JavaScript表达式实现远程代码执行。
CVSS Information
N/A
Vulnerability Type
N/A