Synopsys: Automated PR: Update ejs/1.0.0 to 3.1.9 #1
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Vulnerabilities associated with ejs/1.0.0
BDSA-2023-1179 (CRITICAL): ejs is vulnerable to server-side template injection (SSTI) leading to remote code execution (RCE) when an application using ejs has user controlled input passed directly into the
res.render()
function. This could allow a remote attacker to execute commands on the underlying web server of such an application.Note: The validity of this vulnerability is contested by the maintainer of this application in this comment, since they already have a specific guidance against passing user input to
res.render()
here.BDSA-2016-1198 (HIGH): Weak input validation in the
ejs.renderFile()
function in the ejs package for Node.js could allow an attacker to perform remote code execution.CVE-2017-1000189 (HIGH): nodejs ejs version older than 2.5.5 is vulnerable to a denial-of-service due to weak input validation in the ejs.renderFile()
Click Here To See More Details On Server