Files
CVEs-PoC/2021/CVE-2021-21278.md
2025-09-29 21:09:30 +02:00

18 lines
1.0 KiB
Markdown

### [CVE-2021-21278](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21278)
![](https://img.shields.io/static/v1?label=Product&message=RSSHub&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C%207f1c430%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20('Injection')&color=brightgreen)
### Description
RSSHub is an open source, easy to use, and extensible RSS feed generator. In RSSHub before version 7f1c430 (non-semantic versioning) there is a risk of code injection. Some routes use `eval` or `Function constructor`, which may be injected by the target site with unsafe code, causing server-side security issues The fix in version 7f1c430 is to temporarily remove the problematic route and added a `no-new-func` rule to eslint.
### POC
#### Reference
- https://www.npmjs.com/package/rsshub
#### Github
No PoCs found on GitHub currently.