CVE-2023-23619
Improper Control of Generation of Code ('Code Injection') in @asyncapi/modelina
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Modelina is a library for generating data models based on inputs such as AsyncAPI, OpenAPI, or JSON Schema documents. Versions prior to 1.0.0 are vulnerable to Code injection. This issue affects anyone who is using the default presets and/or does not handle the functionality themself. This issue has been partially mitigated in version 1.0.0, with the maintainer's GitHub Security Advisory (GHSA) noting "It is impossible to fully guard against this, because users have access to the original raw information. However, as of version 1, if you only access the constrained models, you will not encounter this issue. Further similar situations are NOT seen as a security issue, but intended behavior." The suggested workaround from the maintainers is "Fully custom presets that change the entire rendering process which can then escape the user input."
Modelina es una librería para generar modelos de datos basados en entradas como documentos AsyncAPI, OpenAPI o JSON Schema. Las versiones anteriores a la 1.0.0 son vulnerables a la inyección de código. Este problema afecta a cualquiera que utilice los ajustes preestablecidos predeterminados y/o no maneje la funcionalidad por sí mismo. Este problema se ha mitigado parcialmente en la versión 1.0.0, y el GitHub Security Advisory (GHSA) del fabricante señala: "Es imposible protegerse completamente contra esto, porque los usuarios tienen acceso a la información sin procesar original. Sin embargo, a partir de la versión 1, si solo accede a los modelos restringidos, no encontrará este problema. Otras situaciones similares NO se consideran un problema de seguridad, sino un comportamiento previsto". La solución sugerida por los fabricantees es "Preajustes totalmente personalizados que cambian todo el proceso de renderizado y luego pueden escapar de la entrada del usuario".
CVSS Scores
SSVC
- Decision:-
Timeline
- 2023-01-16 CVE Reserved
- 2023-01-26 CVE Published
- 2024-08-02 CVE Updated
- 2024-08-02 First Exploit
- 2024-08-18 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/asyncapi/modelina/security/advisories/GHSA-4jg2-84c2-pj95 | 2024-08-02 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Lfprojects Search vendor "Lfprojects" | Modelina Search vendor "Lfprojects" for product "Modelina" | < 1.0.0 Search vendor "Lfprojects" for product "Modelina" and version " < 1.0.0" | node.js |
Affected
|