DirectorySecurity Advisories
Sign In
Security Advisories

CGA-ch6w-pf83-9x3r

Published

Last updated

https://images.chainguard.dev/security/CGA-ch6w-pf83-9x3r
Package

gitlab-rails-ee-fips-17.2

Latest Update
Not affected
Aliases
  • CVE-2024-36361
  • GHSA-3965-hpx2-q597

Severity

6.8

Medium

CVSS V3

Summary

Pug allows JavaScript code execution if an application accepts untrusted input

Description

Pug through 3.0.2 allows JavaScript code execution if an application accepts untrusted input for the name option of the compileClient, compileFileClient, or compileClientWithDependenciesTracked function. NOTE: these functions are for compiling Pug templates into JavaScript, and there would typically be no reason to allow untrusted callers.

References

Updates


Safe Source for Open Sourceâ„¢
Media KitContact Us
© 2024 Chainguard. All Rights Reserved.
Private PolicyTerms of Use

Product

Chainguard Images