Description
Affected versions of jdf-sass
insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running jdf-sass
.
Recommendation
No fix is available yet. Followings are affected versions:
- <= 1.0.18
References
Related Issues
- pg-promise SQL Injection vulnerability - CVE-2025-29744
- njwt Prototype Pollution vulnerability - CVE-2024-34273
- Elliptic allows BER-encoded signatures - CVE-2024-42461
- ejs lacks certain pollution protection - CVE-2024-33883
- Tags:
- npm
- jdf-sass
Anything's wrong? Let us know Last updated on September 13, 2023