Arbitrary Code Execution in eslint-utils
Critical severity
GitHub Reviewed
Published
Aug 20, 2019
in
mysticatea/eslint-utils
•
Updated Feb 12, 2025
Description
Published to the GitHub Advisory Database
Aug 26, 2019
Reviewed
Jun 16, 2020
Last updated
Feb 12, 2025
Versions of
eslint-utils
>=1.2.0 or <1.4.1 are vulnerable to Arbitrary Code Execution. ThegetStaticValue
does not properly sanitize user input allowing attackers to supply malicious input that executes arbitrary code during the linting process. ThegetStringIfConstant
andgetPropertyName
functions are not affected.Recommendation
Upgrade to version 1.4.1 or later.
References