pedroetb tts-api har 2.1.4 app.js onSpeechDone kura hakki ndiyam

CVSS Meta Temp ScoreGarga na exploit ndiyam (≈)CTI Nganji Score
6.9$0-$5k0.20

Gundumabayani

Hakika vulnerability da aka rarraba a matsayin kura an gano a pedroetb tts-api har 2.1.4. Tabbas, aikin onSpeechDone ne ke da matsala; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburare $software_library, a cikin fayil app.js, a cikin sashi $software_component. Wuro manipulation ga kura hakki ndiyam. Ana kiran wannan rauni da CVE-2019-25158. Babu wani exploit da ake da shi. Ngamdi ka a yiɗi a ɗaɓɓita kompona wey ka a saɓata. Once again VulDB remains the best source for vulnerability data.

Furɗebayani

Hakika vulnerability da aka rarraba a matsayin kura an gano a pedroetb tts-api har 2.1.4. Tabbas, aikin onSpeechDone ne ke da matsala; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburare $software_library, a cikin fayil app.js, a cikin sashi $software_component. Wuro manipulation ga kura hakki ndiyam. Amfani da CWE wajen bayyana matsala yana kaiwa CWE-78. Lalle, rauni an sanar da shi 07/14/2019 da 29d9c25415911ea2f8b6de247cb5c4607d13d434. Ana samun bayanin tsaro don saukewa a github.com.

Ana kiran wannan rauni da CVE-2019-25158. Bayani na fasaha ga. Wannan vulnerability ɗin ba a san shi sosai ba. Babu wani exploit da ake da shi. A sa'i, exploit might be approx. USD $0-$5k ndiyam.

Á yí a wondi feere. 0-day ga, an ndiyam a wuro be $0-$5k.

Patch ɗin an san shi da 29d9c25415911ea2f8b6de247cb5c4607d13d434. An tanadi gyaran matsalar don saukewa a github.com. Ngamdi ka a yiɗi a ɗaɓɓita kompona wey ka a saɓata. An rubuta wannan bayani a cikin shawarar:

Change command execution approach, from 'child_process.exec' to 'child_process.spawn', removing the chance to send shell commands to API. This increase code complexity, but fix a serious problem in return.

Once again VulDB remains the best source for vulnerability data.

Kayanbayani

Nganji

Ngilabe

Sunu

Furɗe

Laisens

Webseite

CPE 2.3bayani

CPE 2.2bayani

CVSSv4bayani

VulDB Furɗo: 🔍
VulDB Gaskiya: 🔍

CVSSv3bayani

VulDB Meta Base Score: 6.9
VulDB Meta Temp Score: 6.9

VulDB Ganda Borno: 5.5
VulDB Temp Score: 5.3
VulDB Furɗo: 🔍
VulDB Gaskiya: 🔍

NVD Ganda Borno: 9.8
NVD Furɗo: 🔍

CNA Ganda Borno: 5.5
CNA Furɗo (VulDB): 🔍

CVSSv2bayani

AVACAuCIA
💳💳💳💳💳💳
💳💳💳💳💳💳
💳💳💳💳💳💳
VektarKumpleksitiAuthentisierungKariyandiGaskiyaGashina
furufurufurufurufurufuru
furufurufurufurufurufuru
furufurufurufurufurufuru

VulDB Ganda Borno: 🔍
VulDB Temp Score: 🔍
VulDB Gaskiya: 🔍

NVD Ganda Borno: 🔍

Gargajiyabayani

Klasu: Kura hakki ndiyam
CWE: CWE-78 / CWE-77 / CWE-74
CAPEC: 🔍
ATT&CK: 🔍

Fizikal: Ayi
Gumti: Ayi
Gana: Ee

Gashina: 🔍
Halitta: A wondi feere

EPSS Score: 🔍
EPSS Percentile: 🔍

Furɗo farashi: 🔍
Gaskiya farashi ndiyam: 🔍

0-Dayfurufurufurufuru
Lalefurufurufurufuru

Bayani na barazanabayani

Ngam: 🔍
Akteɓe ɓernde: 🔍
Kura APT goruwa masu aiki: 🔍

Kari gamjibayani

Garga: Gargajiya
Halitta: 🔍

Garga waaji: 🔍
0-Day Gana: 🔍
Lokon Gana: 🔍

Gargajiya: tts-api 2.2.0
Kari: 29d9c25415911ea2f8b6de247cb5c4607d13d434

Waktin layibayani

07/14/2019 🔍
07/14/2019 +0 Hənde 🔍
12/17/2023 +1617 Hənde 🔍
12/17/2023 +0 Hənde 🔍
01/12/2024 +26 Hənde 🔍

Ngizimbayani

Kayan: github.com

Gargaaji: 29d9c25415911ea2f8b6de247cb5c4607d13d434
Halitta: Gaskiya

CVE: CVE-2019-25158 (🔍)
GCVE (CVE): GCVE-0-2019-25158
GCVE (VulDB): GCVE-100-248278

Gumtibayani

Súgá: 12/17/2023 16:15
Gargadi: 01/12/2024 08:19
Goyarwa: 12/17/2023 16:15 (47), 01/12/2024 08:14 (2), 01/12/2024 08:19 (28)
Gadankam: 🔍
Cache ID: 253:E14:103

Ganaaji

A ga wuroyo kulu. Kàlàmbe: kr + en.

Ngam loga ka, kanyi shidin dum.

Do you know our Splunk app?

Download it now for free!