Arbitrary Code Injection in pouchdb
Critical severity
GitHub Reviewed
Published
Jul 26, 2018
to the GitHub Advisory Database
•
Updated Jan 9, 2023
Description
Published to the GitHub Advisory Database
Jul 26, 2018
Reviewed
Jun 16, 2020
Last updated
Jan 9, 2023
Affected versions of
pouchdb
do not properly sandbox the code execution engine which executes the map/reduce functions for temporary views and design documents. Under certain circumstances, an attacker could uses this to run arbitrary code on the server.Recommendation
Update to version 6.0.5 or later.
References