Description
Squirrelly is a template engine implemented in JavaScript that works out of the box with ExpressJS. Squirrelly mixes pure template data with engine configuration options through the Express render API. By overwriting internal configuration options remote code execution may be triggered in downstream applications. This issue is fixed in version 9.0.0. For complete details refer to the referenced GHSL-2021-023.
Remediation
References
https://securitylab.github.com/advisories/GHSL-2021-023-squirrelly/
https://github.com/squirrellyjs/squirrelly/pull/254
https://github.com/squirrellyjs/squirrelly/commit/c12418a026f73df645ba927fd29358efe02fed1e
https://github.com/squirrellyjs/squirrelly/commit/dca7a1e7ee91d8a6ffffb655f3f15647486db9da
Related Vulnerabilities
CVE-2023-38698 Vulnerability in npm package @ensdomains/ens-contracts
CVE-2020-28276 Vulnerability in npm package deep-set
CVE-2021-39149 Vulnerability in maven package com.thoughtworks.xstream:xstream
CVE-2017-16116 Vulnerability in npm package string
CVE-2018-3721 Vulnerability in maven package org.webjars.bower:lodash