Bug 1956688 (CVE-2021-23383)
Summary: | CVE-2021-23383 nodejs-handlebars: Remote code execution when compiling untrusted compile templates with compat:true option | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Riccardo Schirone <rschiron> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | alazarot, aos-bugs, bdettelb, bmontgom, cfeist, cluster-maint, e, emingora, eparis, etirelli, ewolinet, extras-orphan, gghezzo, gparvin, hvyas, ibek, idevat, jburrell, jcantril, jokerman, jramanat, jrokos, jstastny, jweiser, jwendell, kaycoth, kconner, kmalyjur, krathod, kverlaen, mlisik, mnovotny, mpospisi, nodejs-sig, nstielau, omular, piotr1212, pjindal, puebele, rcernich, rguimara, rrajasek, sponnaga, stcannon, thee, tojeline, tomckay, twalsh, tzimanyi |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | handlebars 4.7.7 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in nodejs-handlebars. A unescaped value in the JavaScriptCompiler.prototype.depthedLookup function allows an attacker, who can provide untrusted handlebars templates, to execute arbitrary code in the javascript system (e.g. browser or server) when the template is compiled with the compat:true option. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2021-06-29 10:41:36 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1956695, 1958632, 1883902, 1949679, 1952909, 1956696, 1956705, 1956706, 1956870 | ||
Bug Blocks: | 1948762 |
Description
Riccardo Schirone
2021-05-04 08:44:53 UTC
This issue is just about the compat:true option. Created nodejs-handlebars tracking bugs for this issue: Affects: epel-7 [bug 1956695] Affects: fedora-32 [bug 1956696] Statement: Red Hat OpenShift Container Platform (OCP) 4 delivers the kibana package which includes Handlebars.js. From OCP 4.6, the kibana package is no longer shipped and will not be fixed. The openshift4/ose-logging-kibana6 container includes Handlebars.js directly as container first code. In OpenShift Container Platform (OCP) and OpenShift ServiceMesh (OSSM) some components include the vulnerable handlebars library, but access is protected by OpenShift OAuth what reducing impact by this flaw to LOW. Red Hat Quay includes Handlebars.js as a development dependency. It does not use Handlebars.js at runtime to process templates so have been given a low impact rating. Red Hat Gluster Storage 3 bundles vulnerable Handlebars.js (with pcs), however it does not use "compat" option and templates from external sources, hence this issue has been rated as having a security impact of Low. This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.6 Via RHSA-2021:2500 https://access.redhat.com/errata/RHSA-2021:2500 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-23383 This issue has been addressed in the following products: Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 7 Red Hat Advanced Cluster Management for Kubernetes 2.3 for RHEL 8 Via RHSA-2021:3016 https://access.redhat.com/errata/RHSA-2021:3016 This issue has been addressed in the following products: OpenShift Logging 5.1 Via RHSA-2021:4628 https://access.redhat.com/errata/RHSA-2021:4628 This issue has been addressed in the following products: OpenShift Logging 5.2 Via RHSA-2021:4032 https://access.redhat.com/errata/RHSA-2021:4032 This issue has been addressed in the following products: Red Hat Process Automation Via RHSA-2023:1334 https://access.redhat.com/errata/RHSA-2023:1334 |