Files
CVEs-PoC/2021/CVE-2021-23358.md
2025-09-29 21:09:30 +02:00

35 lines
1.6 KiB
Markdown

### [CVE-2021-23358](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23358)
![](https://img.shields.io/static/v1?label=Product&message=underscore&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=1.13.0-0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=1.3.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=unspecified%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Arbitrary%20Code%20Injection&color=brightgreen)
### Description
The package underscore from 1.13.0-0 and before 1.13.0-2, from 1.3.2 and before 1.12.1 are vulnerable to Arbitrary Code Injection via the template function, particularly when a variable property is passed as an argument as it is not sanitized.
### POC
#### Reference
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1081504
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBJASHKENAS-1081505
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1081503
- https://snyk.io/vuln/SNYK-JS-UNDERSCORE-1080984
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/EkamSinghWalia/Detection-script-for-cve-2021-23358
- https://github.com/Ghifari160/splash
- https://github.com/LogicalAlmond/csec302-demo
- https://github.com/MehdiBoukhobza/SandBox_CVE-2021-23358
- https://github.com/amakhu/cdp
- https://github.com/andisfar/LaunchQtCreator
- https://github.com/captcha-n00b/CVEcrystalyer
- https://github.com/dellalibera/dellalibera
- https://github.com/ghifari160/splash
- https://github.com/k1LoW/oshka
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/seal-community/patches