Description
Squirrelly is a template engine implemented in JavaScript that works out of the box with ExpressJS. Squirrelly mixes pure template data with engine configuration options through the Express render API. By overwriting internal configuration options remote code execution may be triggered in downstream applications. This issue is fixed in version 9.0.0. For complete details refer to the referenced GHSL-2021-023.
Remediation
References
https://github.com/squirrellyjs/squirrelly/commit/c12418a026f73df645ba927fd29358efe02fed1e
https://github.com/squirrellyjs/squirrelly/commit/dca7a1e7ee91d8a6ffffb655f3f15647486db9da
https://github.com/squirrellyjs/squirrelly/pull/254
https://securitylab.github.com/advisories/GHSL-2021-023-squirrelly/
Related Vulnerabilities
CVE-2022-41404 Vulnerability in maven package org.ini4j:ini4j
CVE-2020-28437 Vulnerability in npm package heroku-env
CVE-2019-15532 Vulnerability in npm package cyberchef
CVE-2017-18355 Vulnerability in npm package rendertron-middleware
CVE-2023-29215 Vulnerability in maven package org.apache.linkis:linkis-engineplugin-jdbc