Unsafe eval() in summit allows arbitrary code execution
Critical severity
GitHub Reviewed
Published
Sep 1, 2020
to the GitHub Advisory Database
•
Updated Nov 14, 2023
Description
Published by the National Vulnerability Database
Jun 4, 2018
Reviewed
Aug 31, 2020
Published to the GitHub Advisory Database
Sep 1, 2020
Last updated
Nov 14, 2023
Affected versions of
summit
allow attackers to execute arbitrary commands via collection names when using thePouchDB
driver.Recommendation
No direct patch is available at this time.
Currently, the best option to mitigate the issue is to avoid using the
PouchDB
driver, as the package author has abandoned this feature entirely.References