Vulnerabilities/

Arbitrary Code Injection in pouchdb

Severity:
High

Description

Affected versions of pouchdb do not properly sandbox the code execution engine which executes the map/reduce functions for temporary views and design documents. Under certain circumstances, an attacker could uses this to run arbitrary code on the server.

Recommendation

Update the pouchdb package to the latest compatible version. Followings are version details:

References

Related Issues

Tags:
npm
pouchdb
Anything's wrong? Let us know Last updated on January 09, 2023

This issue is available in SmartScanner Professional

See Pricing