### [CVE-2014-7205](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7205) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Eval injection vulnerability in the internals.batch function in lib/batch.js in the bassmaster plugin before 1.5.2 for the hapi server framework for Node.js allows remote attackers to execute arbitrary Javascript code via unspecified vectors. ### POC #### Reference - https://www.exploit-db.com/exploits/40689/ #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/AndrewTrube/CVE-2014-7205 - https://github.com/BLACKHAT-SSG/OSWE-Preparation- - https://github.com/MdTauheedAlam/AWAE-OSWE-Notes - https://github.com/PwnAwan/OSWE-Preparation- - https://github.com/R0B1NL1N/OSWE - https://github.com/Xcod3bughunt3r/OSWE - https://github.com/alanshaw/nsp-advisories-api - https://github.com/kymb0/web_study - https://github.com/maximilianmarx/bassmaster-rce - https://github.com/mishmashclone/ManhNho-AWAE-OSWE - https://github.com/mishmashclone/timip-OSWE - https://github.com/shreyaschavhan/oswe-awae-pre-preperation-plan-and-notes - https://github.com/tatumroaquin/ssji-webapp - https://github.com/tatumroaquin/vwa-ssji - https://github.com/timip/OSWE - https://github.com/zer0byte/AWAE-OSWP