CVE-2022-21122
Arbitrary Code Execution
Severity Score
9.8
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
1
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
The package metacalc before 0.0.2 are vulnerable to Arbitrary Code Execution when it exposes JavaScript's Math class to the v8 context. As the Math class is exposed to user-land, it can be used to get access to JavaScript's Function constructor.
El paquete metacalc versiones anteriores a 0.0.2, es vulnerable a una ejecución arbitraria de código cuando expone la clase Math de JavaScript al contexto v8. Como la clase Math está expuesta al contexto del usuario, puede ser usada para conseguir acceso al constructor de funciones de JavaScript
*Credits:
Vladyslav Dukhin
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2022-02-24 CVE Reserved
- 2022-06-03 CVE Published
- 2024-09-16 CVE Updated
- 2024-09-16 First Exploit
- 2025-02-16 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
References (3)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://snyk.io/vuln/SNYK-JS-METACALC-2826197 | 2024-09-16 |
URL | Date | SRC |
---|---|---|
https://github.com/metarhia/metacalc/commit/625c23d63eabfa16fc815f5832b147b08d2144bd | 2022-06-17 | |
https://github.com/metarhia/metacalc/pull/16 | 2022-06-17 |
URL | Date | SRC |
---|