First published: Mon Apr 25 2022(Updated: )
A Command injection attack was found in ejs (Embedded JavaScript templates) for Node.js, which allows an attacker to execute server-side template injection in settings[view options][outputFunctionName]. This is parsed as an internal option and overwrites the outputFunctionName option with an arbitrary OS command executed upon template compilation.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ejs Ejs | =3.1.6 | |
redhat/ejs | <3.1.7 | 3.1.7 |
IBM Cognos Analytics 11.2.x | <=IBM Cognos Analytics 11.2.x | |
IBM Cognos Analytics 11.1.x | <=IBM Cognos Analytics 11.1.x |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-29078 is a vulnerability in the ejs (aka Embedded JavaScript templates) package 3.1.6 for Node.js that allows a remote attacker to execute arbitrary code on the system through server-side template injection.
CVE-2022-29078 has a severity level of 9.8, which is classified as critical.
CVE-2022-29078 affects the Ejs Ejs package version 3.1.6 for Node.js by allowing a remote attacker to execute arbitrary code on the system through a server-side template injection flaw in settings[view options][outputFunctionName].
To fix CVE-2022-29078, it is recommended to upgrade to version 3.1.7 of the Ejs package for Node.js.
CVE-2022-29078 affects Ejs Ejs package version 3.1.6 for Node.js, as well as IBM Cognos Analytics versions 11.2.x and 11.1.x.