Description
Medis version 0.6.1 and earlier contains a XSS vulnerability evolving into code execution due to enabled nodeIntegration for the renderer process vulnerability in Key name parameter on new key creation that can result in Unauthorized code execution in the victim's machine, within the rights of the running application. This attack appear to be exploitable via Victim is synchronizing data from the redis server which contains malicious key value.
Remediation
References
https://github.com/luin/medis/issues/109
Related Vulnerabilities
CVE-2022-37616 Vulnerability in maven package org.webjars.npm:xmldom
CVE-2020-10244 Vulnerability in maven package dev.paseto:jpaseto-impl
CVE-2020-15123 Vulnerability in npm package codecov
CVE-2022-39263 Vulnerability in npm package @next-auth/upstash-redis-adapter
CVE-2021-32854 Vulnerability in maven package org.webjars.npm:textangular