Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-5941

EPSS 77.93% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2017-5941

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An issue was discovered in the node-serialize package 0.0.4 for Node.js. Untrusted data passed into the unserialize() function can be exploited to achieve arbitrary code execution by passing a JavaScript Object with an Immediately Invoked Function Expression (IIFE).
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Joyent Node.js 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Joyent Node.js是美国Joyent公司的一套建立在Google V8 JavaScript引擎之上的网络应用平台。该平台主要用于构建高度可伸缩的应用程序,以及编写能够处理数万条且同时连接到一个物理机的连接代码。 Joyent Node.js中的node-serialize模块的unserialize()函数存在代码问题漏洞,该漏洞源于该函数未对外部调用的代码进行有效检测。远程攻击者可通过将恶意数据传入该函数利用该漏洞执行任意代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2017-5941

#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/Frivolous-scholar/CVE-2017-5941-NodeJS-RCEPOC Details
2Nonehttps://github.com/turnernator1/Node.js-CVE-2017-5941POC Details
3Ejecución de exploit de deserialización con CVE-2017-5941https://github.com/Cr4zyD14m0nd137/Lab-for-cve-2018-15133POC Details
4Exploit de reverseshell para desserialização em NodeJs (CVE-2017-5941)https://github.com/arthurvmbl/nodejshellPOC Details
5Exploit de reverseshell para desserialização em NodeJs (CVE-2017-5941)https://github.com/uartu0/nodejshellPOC Details
6Nonehttps://github.com/kylew1004/cve-2017-5941-poc-docker-labPOC Details
7Exploit Title: Node.JS - 'node-serialize' Remote Code Execution (2), Version: 0.0.4, CVE: CVE-2017-5941https://github.com/cybersploit-tech/RCE-NodeJsPOC Details
8Exploit Title: Node.JS - 'node-serialize' Remote Code Execution (2), Version: 0.0.4, CVE: CVE-2017-5941https://github.com/f41k0n/RCE-NodeJsPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2017-5941

Please Login to view more intelligence information

Same Patch Batch · n/a · 2017-02-09 · 50 CVEs total

CVE-2016-5727Simple Machines Forum 代码注入漏洞
CVE-2017-5840Gstreamer Good Plug-ins 安全漏洞
CVE-2017-5844Gstreamer Base Plug-ins 安全漏洞
CVE-2017-5845Gstreamer Good Plug-ins 安全漏洞
CVE-2017-5846Gstreamer Ugly Plug-ins 安全漏洞
CVE-2017-5847Gstreamer Ugly Plug-ins 安全漏洞
CVE-2017-5848Gstreamer Bad Plug-ins插件安全漏洞
CVE-2017-5843GStreamer 安全漏洞
CVE-2016-6173NSD 安全漏洞
CVE-2016-6171Knot DNS 安全漏洞
CVE-2017-5837GStreamer Base Plug-ins 安全漏洞
CVE-2016-5726Simple Machines Forum 代码注入漏洞
CVE-2016-4988CloudBees Jenkins Build Failure Analyzer插件跨站脚本漏洞
CVE-2016-4987CloudBees Jenkins Image Gallery插件路径遍历漏洞
CVE-2016-4986CloudBees Jenkins TAP插件路径遍历漏洞
CVE-2016-3102CloudBees Jenkins Script Security插件安全漏洞
CVE-2016-3101CloudBees Jenkins Extra Columns插件跨站脚本漏洞
CVE-2016-2148BusyBox 缓冲区错误漏洞
CVE-2016-2147BusyBox 数字错误漏洞
CVE-2016-10199GStreamer Good Plug-ins组件安全漏洞

Showing top 20 of 50 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2017-5941

No comments yet


Leave a comment