Description
Squirrelly is a template engine implemented in JavaScript that works out of the box with ExpressJS. Squirrelly mixes pure template data with engine configuration options through the Express render API. By overwriting internal configuration options remote code execution may be triggered in downstream applications. This issue is fixed in version 9.0.0. For complete details refer to the referenced GHSL-2021-023.
Remediation
References
https://securitylab.github.com/advisories/GHSL-2021-023-squirrelly/
https://github.com/squirrellyjs/squirrelly/pull/254
https://github.com/squirrellyjs/squirrelly/commit/c12418a026f73df645ba927fd29358efe02fed1e
https://github.com/squirrellyjs/squirrelly/commit/dca7a1e7ee91d8a6ffffb655f3f15647486db9da
Related Vulnerabilities
CVE-2018-15685 Vulnerability in maven package org.webjars.npm:electron
CVE-2022-47042 Vulnerability in maven package net.mingsoft:ms-mcms
CVE-2022-21681 Vulnerability in npm package marked
CVE-2023-3691 Vulnerability in npm package layui
CVE-2023-26486 Vulnerability in maven package org.webjars.npm:vega-functions