First published: Mon Jul 25 2022(Updated: )
This affects the package thenify before 3.3.1. The name argument provided to the package can be controlled by users without any sanitization, and this is provided to the eval function without any sanitization.
Credit: report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
thenify node.js | <3.3.1 | |
Debian | =10.0 | |
Fedora | =36 | |
Fedora | =37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-7677 is classified as a high-severity vulnerability due to potential arbitrary code execution.
To fix CVE-2020-7677, upgrade to thenify version 3.3.1 or later.
CVE-2020-7677 affects versions of thenify before 3.3.1 across various platforms like Debian and Fedora.
CVE-2020-7677 is a code injection vulnerability due to the lack of input sanitization.
Yes, CVE-2020-7677 can lead to data breaches by allowing attackers to execute arbitrary code.