First published: Sun Aug 30 2020(Updated: )
This affects the package json before 10.0.0. It is possible to inject arbritary commands using the parseLookup function.
Credit: report@snyk.io report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.webjars.npm:json | <=9.0.6 | |
npm/json | <10.0.0 | 10.0.0 |
Joyent Json Node.js | <10.0.0 | |
Oracle Commerce Guided Search | =11.3.2 | |
Oracle Financial Services Crime And Compliance Management Studio | =8.0.8.2.0 | |
Oracle Financial Services Crime And Compliance Management Studio | =8.0.8.3.0 | |
Oracle Financial Services Regulatory Reporting With Agilereporter | =8.0.9.6.3 | |
Oracle TimesTen In-Memory Database | <21.1.1.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-7712 is a vulnerability that affects the package json before version 10.0.0 and allows for arbitrary command injection using the parseLookup function.
The software affected by CVE-2020-7712 includes org.webjars.npm:json, npm/json, Joyent Json, Oracle Commerce Guided Search, Oracle Financial Services Crime And Compliance Management Studio, Oracle TimesTen In-Memory Database.
CVE-2020-7712 has a severity rating of 7.2, indicating a high severity vulnerability.
To fix CVE-2020-7712, update your package json to version 10.0.0 or later.
You can find more information about CVE-2020-7712 on the NIST NVD website (https://nvd.nist.gov/vuln/detail/CVE-2020-7712) and on the GitHub repository for json (https://github.com/trentm/json/issues/144).