First published: Fri Mar 03 2023(Updated: )
Vega is a visualization grammar, a declarative format for creating, saving, and sharing interactive visualization designs. The Vega `scale` expression function has the ability to call arbitrary functions with a single controlled argument. The scale expression function passes a user supplied argument group to getScale, which is then used as if it were an internal context. The context.scales[name].value is accessed from group and called as a function back in scale. This can be exploited to escape the Vega expression sandbox in order to execute arbitrary JavaScript. This issue has been fixed in version 5.13.1.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
npm is-function | <5.13.1 | |
Vega Project Vega | <5.23.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-26486 is a vulnerability in the Vega visualization grammar that allows arbitrary function calls with a user-supplied argument.
CVE-2023-26486 affects Vega by exploiting the scale expression function, allowing attackers to call arbitrary functions with a controlled argument.
CVE-2023-26486 has a severity rating of medium with a CVSS score of 6.1.
Vega-functions v5.13.1 and Vega v5.23.0 (up to exclusive) are affected by CVE-2023-26486.
To fix CVE-2023-26486, update your Vega or Vega-functions software to a version higher than the affected versions.