Path traversal and code execution via prototype vulnerability
Description
Published by the National Vulnerability Database
Jul 24, 2023
Published to the GitHub Advisory Database
Jul 25, 2023
Reviewed
Jul 25, 2023
Last updated
Nov 9, 2023
Impact
Due to the use of the object destructuring assignment syntax in the user export code path, combined with a path traversal vulnerability, a specially crafted payload could invoke the user export logic to arbitrarily execute javascript files on the local disk.
Patches
Patched in v2.8.7
Workarounds
Site maintainers can cherry pick ec58700f6dff8e5b4af1544f6205ec362b593092 into their codebase to patch the exploit.
References